CVE-2025-12098: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in academylms Academy LMS Pro
The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.8 via the 'enqueue_social_login_script' function. This makes it possible for unauthenticated attackers to extract sensitive data including the Facebook App Secret if Facebook Social Login is enabled.
AI Analysis
Technical Summary
CVE-2025-12098 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Academy LMS Pro plugin for WordPress, specifically versions up to and including 3.3.8. The vulnerability arises from the 'enqueue_social_login_script' function, which improperly exposes sensitive data, notably the Facebook App Secret, when Facebook Social Login is enabled. This exposure occurs without requiring any authentication or user interaction, making it remotely exploitable by unauthenticated attackers. The Facebook App Secret is a critical credential that, if compromised, can allow attackers to impersonate the legitimate Facebook application, potentially enabling unauthorized access to user accounts or manipulation of social login flows. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, and limited confidentiality impact. No patches or updates have been officially released at the time of this report, and no known exploits are currently observed in the wild. The vulnerability primarily threatens the confidentiality of sensitive credentials, which could be leveraged in subsequent attacks targeting user accounts or the LMS platform itself. Given the widespread use of WordPress and LMS plugins in educational and corporate training environments, this vulnerability poses a tangible risk to organizations relying on Academy LMS Pro for their eLearning solutions.
Potential Impact
For European organizations, the exposure of the Facebook App Secret through this vulnerability could lead to significant confidentiality breaches. Attackers gaining access to this secret could impersonate the Facebook application, potentially allowing unauthorized access to user accounts via social login mechanisms. This could result in unauthorized data access, user impersonation, and erosion of trust in the affected eLearning platforms. Educational institutions, corporate training providers, and other organizations using Academy LMS Pro in Europe could face reputational damage, compliance issues under GDPR due to unauthorized data exposure, and operational disruptions if attackers leverage the exposed credentials for further attacks. The impact is particularly critical for organizations that heavily rely on Facebook Social Login for user authentication, as the compromised secret undermines the security of the login process. Although no direct availability or integrity impacts are reported, the confidentiality breach alone warrants prompt attention to prevent escalation.
Mitigation Recommendations
European organizations should immediately audit their use of the Academy LMS Pro plugin and verify if Facebook Social Login is enabled. If enabled, it is advisable to disable this feature temporarily until an official patch or update is released by the vendor. In the absence of a patch, organizations can implement custom code modifications to restrict access to the 'enqueue_social_login_script' function or sanitize outputs to prevent exposure of the Facebook App Secret. Additionally, organizations should rotate the Facebook App Secret associated with their applications to invalidate any potentially compromised credentials. Monitoring web server logs for unusual access patterns targeting the vulnerable function can help detect exploitation attempts. Organizations should also ensure that their WordPress installations and plugins are regularly updated and consider implementing a Web Application Firewall (WAF) with rules to block suspicious requests targeting this vulnerability. Finally, educating administrators about the risks of exposing sensitive credentials in plugin code and enforcing strict access controls on WordPress admin interfaces will reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-12098: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in academylms Academy LMS Pro
Description
The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.8 via the 'enqueue_social_login_script' function. This makes it possible for unauthenticated attackers to extract sensitive data including the Facebook App Secret if Facebook Social Login is enabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-12098 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Academy LMS Pro plugin for WordPress, specifically versions up to and including 3.3.8. The vulnerability arises from the 'enqueue_social_login_script' function, which improperly exposes sensitive data, notably the Facebook App Secret, when Facebook Social Login is enabled. This exposure occurs without requiring any authentication or user interaction, making it remotely exploitable by unauthenticated attackers. The Facebook App Secret is a critical credential that, if compromised, can allow attackers to impersonate the legitimate Facebook application, potentially enabling unauthorized access to user accounts or manipulation of social login flows. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, and limited confidentiality impact. No patches or updates have been officially released at the time of this report, and no known exploits are currently observed in the wild. The vulnerability primarily threatens the confidentiality of sensitive credentials, which could be leveraged in subsequent attacks targeting user accounts or the LMS platform itself. Given the widespread use of WordPress and LMS plugins in educational and corporate training environments, this vulnerability poses a tangible risk to organizations relying on Academy LMS Pro for their eLearning solutions.
Potential Impact
For European organizations, the exposure of the Facebook App Secret through this vulnerability could lead to significant confidentiality breaches. Attackers gaining access to this secret could impersonate the Facebook application, potentially allowing unauthorized access to user accounts via social login mechanisms. This could result in unauthorized data access, user impersonation, and erosion of trust in the affected eLearning platforms. Educational institutions, corporate training providers, and other organizations using Academy LMS Pro in Europe could face reputational damage, compliance issues under GDPR due to unauthorized data exposure, and operational disruptions if attackers leverage the exposed credentials for further attacks. The impact is particularly critical for organizations that heavily rely on Facebook Social Login for user authentication, as the compromised secret undermines the security of the login process. Although no direct availability or integrity impacts are reported, the confidentiality breach alone warrants prompt attention to prevent escalation.
Mitigation Recommendations
European organizations should immediately audit their use of the Academy LMS Pro plugin and verify if Facebook Social Login is enabled. If enabled, it is advisable to disable this feature temporarily until an official patch or update is released by the vendor. In the absence of a patch, organizations can implement custom code modifications to restrict access to the 'enqueue_social_login_script' function or sanitize outputs to prevent exposure of the Facebook App Secret. Additionally, organizations should rotate the Facebook App Secret associated with their applications to invalidate any potentially compromised credentials. Monitoring web server logs for unusual access patterns targeting the vulnerable function can help detect exploitation attempts. Organizations should also ensure that their WordPress installations and plugins are regularly updated and consider implementing a Web Application Firewall (WAF) with rules to block suspicious requests targeting this vulnerability. Finally, educating administrators about the risks of exposing sensitive credentials in plugin code and enforcing strict access controls on WordPress admin interfaces will reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-22T21:50:49.869Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690f02ef224224608af9754f
Added to database: 11/8/2025, 8:44:31 AM
Last enriched: 11/15/2025, 9:05:57 AM
Last updated: 12/24/2025, 12:48:24 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15048: Command Injection in Tenda WH450
MediumCVE-2025-68696: CWE-918: Server-Side Request Forgery (SSRF) in jnunemaker httparty
HighCVE-2025-68665: CWE-502: Deserialization of Untrusted Data in langchain-ai langchainjs
HighCVE-2025-15049: SQL Injection in code-projects Online Farm System
MediumCVE-2025-68664: CWE-502: Deserialization of Untrusted Data in langchain-ai langchain
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.