Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12099: CWE-502 Deserialization of Untrusted Data in academylms Academy LMS – WordPress LMS Plugin for Complete eLearning Solution

0
High
VulnerabilityCVE-2025-12099cvecve-2025-12099cwe-502
Published: Sat Nov 08 2025 (11/08/2025, 08:27:41 UTC)
Source: CVE Database V5
Vendor/Project: academylms
Product: Academy LMS – WordPress LMS Plugin for Complete eLearning Solution

Description

The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.3.8 via deserialization of untrusted input in the 'import_all_courses' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.

AI-Powered Analysis

AILast updated: 11/08/2025, 08:59:33 UTC

Technical Analysis

CVE-2025-12099 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in the Academy LMS – WordPress LMS Plugin for Complete eLearning Solution. The flaw exists in all versions up to and including 3.3.8, specifically within the 'import_all_courses' function, which improperly deserializes untrusted input. This unsafe deserialization allows an authenticated attacker with administrator privileges to inject a crafted PHP object. However, the vulnerability's impact depends on the presence of a Property Oriented Programming (POP) gadget chain in other installed plugins or themes, as the vulnerable plugin itself does not contain a POP chain. If such a chain exists, the attacker can leverage it to perform malicious actions such as arbitrary file deletion, sensitive data retrieval, or remote code execution. The vulnerability requires no user interaction but does require high privileges (administrator). The CVSS 3.1 score of 7.2 reflects a high severity due to network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the risk is significant in environments where multiple plugins/themes coexist, increasing the likelihood of POP chains. The vulnerability was published on November 8, 2025, and no patches are currently linked, indicating the need for vigilance and proactive mitigation by administrators.

Potential Impact

For European organizations, especially those relying on WordPress-based eLearning platforms, this vulnerability poses a significant risk. Successful exploitation could lead to full compromise of the LMS environment, resulting in unauthorized access to sensitive educational data, deletion or alteration of course content, and potential lateral movement within the network. This could disrupt educational services, damage organizational reputation, and lead to regulatory compliance issues under GDPR due to data breaches. The requirement for administrator-level access limits the attack surface but insider threats or compromised admin accounts could be leveraged. The dependency on additional plugins/themes for POP chains means complex WordPress setups are at higher risk. Given the widespread use of WordPress and LMS solutions in Europe, particularly in countries with strong eLearning adoption, the impact could be broad and severe if exploited.

Mitigation Recommendations

1. Monitor for and apply security patches from the Academy LMS plugin vendor as soon as they become available. 2. Conduct a thorough audit of all installed WordPress plugins and themes to identify and remove or update those containing known POP gadget chains. 3. Restrict administrator access strictly to trusted personnel and implement strong authentication mechanisms such as multi-factor authentication (MFA). 4. Employ web application firewalls (WAF) with rules designed to detect and block deserialization attacks and suspicious payloads. 5. Regularly back up LMS data and verify backup integrity to enable recovery in case of compromise. 6. Use security plugins that monitor for unauthorized changes or suspicious activity within the WordPress environment. 7. Educate administrators about the risks of installing untrusted plugins/themes and encourage minimal plugin usage to reduce attack surface. 8. Implement network segmentation to limit the impact of a compromised LMS server on broader organizational infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-22T22:01:34.655Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690f02ef224224608af97553

Added to database: 11/8/2025, 8:44:31 AM

Last enriched: 11/8/2025, 8:59:33 AM

Last updated: 11/10/2025, 7:45:45 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats