Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12098: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in academylms Academy LMS Pro

0
Medium
VulnerabilityCVE-2025-12098cvecve-2025-12098cwe-200
Published: Sat Nov 08 2025 (11/08/2025, 08:27:42 UTC)
Source: CVE Database V5
Vendor/Project: academylms
Product: Academy LMS Pro

Description

The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.8 via the 'enqueue_social_login_script' function. This makes it possible for unauthenticated attackers to extract sensitive data including the Facebook App Secret if Facebook Social Login is enabled.

AI-Powered Analysis

AILast updated: 11/15/2025, 09:05:57 UTC

Technical Analysis

CVE-2025-12098 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Academy LMS Pro plugin for WordPress, specifically versions up to and including 3.3.8. The vulnerability arises from the 'enqueue_social_login_script' function, which improperly exposes sensitive data, notably the Facebook App Secret, when Facebook Social Login is enabled. This exposure occurs without requiring any authentication or user interaction, making it remotely exploitable by unauthenticated attackers. The Facebook App Secret is a critical credential that, if compromised, can allow attackers to impersonate the legitimate Facebook application, potentially enabling unauthorized access to user accounts or manipulation of social login flows. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, and limited confidentiality impact. No patches or updates have been officially released at the time of this report, and no known exploits are currently observed in the wild. The vulnerability primarily threatens the confidentiality of sensitive credentials, which could be leveraged in subsequent attacks targeting user accounts or the LMS platform itself. Given the widespread use of WordPress and LMS plugins in educational and corporate training environments, this vulnerability poses a tangible risk to organizations relying on Academy LMS Pro for their eLearning solutions.

Potential Impact

For European organizations, the exposure of the Facebook App Secret through this vulnerability could lead to significant confidentiality breaches. Attackers gaining access to this secret could impersonate the Facebook application, potentially allowing unauthorized access to user accounts via social login mechanisms. This could result in unauthorized data access, user impersonation, and erosion of trust in the affected eLearning platforms. Educational institutions, corporate training providers, and other organizations using Academy LMS Pro in Europe could face reputational damage, compliance issues under GDPR due to unauthorized data exposure, and operational disruptions if attackers leverage the exposed credentials for further attacks. The impact is particularly critical for organizations that heavily rely on Facebook Social Login for user authentication, as the compromised secret undermines the security of the login process. Although no direct availability or integrity impacts are reported, the confidentiality breach alone warrants prompt attention to prevent escalation.

Mitigation Recommendations

European organizations should immediately audit their use of the Academy LMS Pro plugin and verify if Facebook Social Login is enabled. If enabled, it is advisable to disable this feature temporarily until an official patch or update is released by the vendor. In the absence of a patch, organizations can implement custom code modifications to restrict access to the 'enqueue_social_login_script' function or sanitize outputs to prevent exposure of the Facebook App Secret. Additionally, organizations should rotate the Facebook App Secret associated with their applications to invalidate any potentially compromised credentials. Monitoring web server logs for unusual access patterns targeting the vulnerable function can help detect exploitation attempts. Organizations should also ensure that their WordPress installations and plugins are regularly updated and consider implementing a Web Application Firewall (WAF) with rules to block suspicious requests targeting this vulnerability. Finally, educating administrators about the risks of exposing sensitive credentials in plugin code and enforcing strict access controls on WordPress admin interfaces will reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-22T21:50:49.869Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690f02ef224224608af9754f

Added to database: 11/8/2025, 8:44:31 AM

Last enriched: 11/15/2025, 9:05:57 AM

Last updated: 12/24/2025, 12:48:24 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats