CVE-2025-12099: CWE-502 Deserialization of Untrusted Data in academylms Academy LMS – WordPress LMS Plugin for Complete eLearning Solution
The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.3.8 via deserialization of untrusted input in the 'import_all_courses' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
AI Analysis
Technical Summary
CVE-2025-12099 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in the Academy LMS WordPress plugin, a popular eLearning solution. The flaw exists in the 'import_all_courses' function, which deserializes PHP objects from untrusted input without sufficient validation. This unsafe deserialization allows an authenticated user with administrator privileges to inject crafted PHP objects. However, exploitation depends on the presence of a gadget POP (Property Oriented Programming) chain in other installed plugins or themes, which can be leveraged to perform malicious actions such as arbitrary file deletion, sensitive data extraction, or remote code execution. The vulnerability does not require user interaction beyond admin authentication and has a CVSS 3.1 base score of 7.2, reflecting its high impact and low attack complexity. No known exploits are currently in the wild, but the risk is significant due to the potential for severe consequences if exploited. The vulnerability affects all versions up to and including 3.3.8 of the plugin. Since the vulnerability requires a POP chain, the overall risk depends on the environment's plugin/theme ecosystem. The vulnerability was published on November 8, 2025, and no official patches or updates were linked at the time of reporting.
Potential Impact
For European organizations, especially educational institutions and eLearning providers using the Academy LMS plugin on WordPress, this vulnerability poses a serious risk. Successful exploitation can lead to full compromise of the LMS environment, including unauthorized data access, deletion of critical course content or user data, and potential server takeover through remote code execution. This can disrupt educational services, cause data breaches involving personal and academic information, and damage organizational reputation. The requirement for administrator-level access limits the attack vector to insiders or compromised admin accounts, but given the privileged nature of such accounts, the impact remains critical. The dependency on additional plugins or themes containing POP chains means that complex WordPress environments with multiple third-party components are at higher risk. European organizations with stringent data protection regulations (e.g., GDPR) face legal and compliance consequences if sensitive data is exposed or lost. The disruption of eLearning platforms can also affect remote education continuity, which remains vital in many European countries.
Mitigation Recommendations
1. Immediately restrict administrator access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Conduct an audit of all installed WordPress plugins and themes to identify and remove or update components that may contain gadget POP chains. 3. Monitor and limit plugin/theme installations to those from reputable sources with active maintenance. 4. Employ web application firewalls (WAFs) capable of detecting and blocking deserialization attacks and suspicious serialized payloads. 5. Regularly back up LMS data and WordPress configurations to enable quick recovery in case of compromise. 6. Stay alert for official patches or updates from the Academy LMS plugin vendor and apply them promptly once available. 7. Implement strict input validation and sanitization policies where possible, especially for functions handling serialized data. 8. Consider isolating the LMS environment from other critical systems to limit lateral movement if exploitation occurs. 9. Educate administrators about the risks of installing unverified plugins or themes that could introduce gadget chains. 10. Monitor logs for unusual activity related to the 'import_all_courses' function or deserialization processes.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-12099: CWE-502 Deserialization of Untrusted Data in academylms Academy LMS – WordPress LMS Plugin for Complete eLearning Solution
Description
The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.3.8 via deserialization of untrusted input in the 'import_all_courses' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
AI-Powered Analysis
Technical Analysis
CVE-2025-12099 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in the Academy LMS WordPress plugin, a popular eLearning solution. The flaw exists in the 'import_all_courses' function, which deserializes PHP objects from untrusted input without sufficient validation. This unsafe deserialization allows an authenticated user with administrator privileges to inject crafted PHP objects. However, exploitation depends on the presence of a gadget POP (Property Oriented Programming) chain in other installed plugins or themes, which can be leveraged to perform malicious actions such as arbitrary file deletion, sensitive data extraction, or remote code execution. The vulnerability does not require user interaction beyond admin authentication and has a CVSS 3.1 base score of 7.2, reflecting its high impact and low attack complexity. No known exploits are currently in the wild, but the risk is significant due to the potential for severe consequences if exploited. The vulnerability affects all versions up to and including 3.3.8 of the plugin. Since the vulnerability requires a POP chain, the overall risk depends on the environment's plugin/theme ecosystem. The vulnerability was published on November 8, 2025, and no official patches or updates were linked at the time of reporting.
Potential Impact
For European organizations, especially educational institutions and eLearning providers using the Academy LMS plugin on WordPress, this vulnerability poses a serious risk. Successful exploitation can lead to full compromise of the LMS environment, including unauthorized data access, deletion of critical course content or user data, and potential server takeover through remote code execution. This can disrupt educational services, cause data breaches involving personal and academic information, and damage organizational reputation. The requirement for administrator-level access limits the attack vector to insiders or compromised admin accounts, but given the privileged nature of such accounts, the impact remains critical. The dependency on additional plugins or themes containing POP chains means that complex WordPress environments with multiple third-party components are at higher risk. European organizations with stringent data protection regulations (e.g., GDPR) face legal and compliance consequences if sensitive data is exposed or lost. The disruption of eLearning platforms can also affect remote education continuity, which remains vital in many European countries.
Mitigation Recommendations
1. Immediately restrict administrator access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Conduct an audit of all installed WordPress plugins and themes to identify and remove or update components that may contain gadget POP chains. 3. Monitor and limit plugin/theme installations to those from reputable sources with active maintenance. 4. Employ web application firewalls (WAFs) capable of detecting and blocking deserialization attacks and suspicious serialized payloads. 5. Regularly back up LMS data and WordPress configurations to enable quick recovery in case of compromise. 6. Stay alert for official patches or updates from the Academy LMS plugin vendor and apply them promptly once available. 7. Implement strict input validation and sanitization policies where possible, especially for functions handling serialized data. 8. Consider isolating the LMS environment from other critical systems to limit lateral movement if exploitation occurs. 9. Educate administrators about the risks of installing unverified plugins or themes that could introduce gadget chains. 10. Monitor logs for unusual activity related to the 'import_all_courses' function or deserialization processes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-22T22:01:34.655Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690f02ef224224608af97553
Added to database: 11/8/2025, 8:44:31 AM
Last enriched: 11/15/2025, 9:06:12 AM
Last updated: 12/22/2025, 6:00:06 AM
Views: 121
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11545: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Sharp Display Solutions, Ltd. NP-PA1705UL-W, NP-PA1705UL-W+, NP-PA1705UL-B, NP-PA1705UL-B+, NP-PA1505UL-W, NP-PA1505UL-W+, NP-PA1505UL-B, NP-PA1505UL-B+, NP-PA1505UL-BJL NP-PV800UL-W, NP-PV800UL-W+, NP-PV800UL-B, NP-PV800UL-B+, NP-PV710UL-W, NP-PV710UL-W+, NP-PV710UL-B, NP-PV710UL-B+, NP-PV800UL-W1, NP-PV800UL-B1, NP-PV710UL-W1, NP-PV710UL-B1, NP-PV800UL-B1G, NP-PV710UL-B1G, NP-PV800UL-WH, NP-PV710UL-WH, NP-P627UL, NP-P627ULG, NP-P627UL+, NP-P547UL, NP-P547ULG, NP-P607UL+, NP-CG6600UL, NP-H6271UL, NP-H5471UL, NP-P627ULH, NP-P547ULH NP-PV710UL+ NP-PA1004UL-W, NP-PA1004UL-WG, NP-PA1004UL-W+, NP-PA1004UL-WH, NP-PA1004UL-B, NP-PA1004UL-BG, NP-PA1004UL-B+, NP-PA804UL-W, NP-PA804UL-WG, NP-PA804UL-W+, NP-PA804UL-WH, NP-PA804UL-B, NP-PA804UL-BG, NP-PA804UL-B+, NP-PA1004UL-BH, NP-PA804UL-BH, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CG6500XL, NP-CG6400UL, NP-CG6400WL, NP-CB4500XL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME382U, NP-ME382UG, NP-ME402X, NP-ME402XG NP-CU4300XD, NP-CU4200XD, NP-CU4200WD, NP-UM383WL, NP-UM383WLG, NP-CJ2200WD, NP-PH3501QL, NP-PH3501QL+, NP-PH2601QL, NP-PH2601QL+, NP-PH350Q40L, NP-PH260Q30L, NP-PX1005QL-W, NP-PX1005QL-B, NP-PX1005QL-B+, NP-P525UL, NP-P525ULG, NP-P525UL+, NP-P525WL, NP-P525WLG, NP-P525WL+, NP-P605UL, NP-P605ULG, NP-P605UL+
CriticalCVE-2025-11544: CWE-912: Hidden Functionality in Sharp Display Solutions, Ltd. NP-P627UL, NP-P627ULG, NP-P627UL+, NP-P547UL, NP-P547ULG, NP-P607UL+, NP-CG6600UL, NP-H6271UL, NP-H5471UL, NP-P627ULH, NP-P547ULH, NP-PE455UL, NP-PE455ULG, NP-PE455WL, NP-PE455WLG, NP-PE505XLG, NP-CG6500XL, NP-CG6400UL, NP-CG6400WL, NP-CB4500XL, NP-CA4120X, NP-CA4160W, NP-CA4160X, NP-CA4200U, NP-CA4200W, NP-CA4202W, NP-CA4260X, NP-CA4300X, NP-CA4355X, NP-CD2100U, NP-CD2120X, NP-CD2300X, NP-CR2100X, NP-CR2170W, NP-CR2170X, NP-CR2200U, NP-CR2200W, NP-CR2280X, NP-CR2310X, NP-CR2350X, NP-MC302XG, NP-MC332WG, NP-MC342XG, NP-MC372X, NP-MC372XG, NP-MC382W, NP-MC382WG, NP-MC422XG, NP-ME342UG, NP-ME372W, NP-ME372WG, NP-ME382U, NP-ME382UG, NP-ME402X, NP-ME402XG, NP-P525UL, NP-P525ULG, NP-P525UL+, NP-P525WL, NP-P525WLG, NP-P525WL+, NP-P605UL, NP-P605ULG, NP-P605UL+, NP-CG6500UL, NP-CG6500WL, NP-CB4500UL, NP-CB4500WL, NP-P525ULH, NP-P525WLH, NP-P605ULH, NP-P554U, NP-P554UG, NP-P554U+, NP-P554W, NP-P554WG, NP-P554W+, NP-P474U, NP-P474UG, NP-P474W, NP-P474WG, NP-P604XG, NP-P604X+, NP-P603XG, NP-P523X+, NP-PE523XG, NP-PE523X+, NP-CF6600U, NP-CF6600W, NP-CF6700X, NP-CF6500X, NP-CB4600U, NP-P554UH, NP-P554WH, NP-P474UH, NP-P474WH, NP-P604XH, NP-P603XH, NP-PE523XH, NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG ,NP-ME401W, NP-ME361W, NP-ME331W, NP-ME301W, NP-ME401X, NP-ME361X, NP-ME331X, NP-ME301X, NP-ME401WG, NP-ME361WG, NP-ME331WG, NP-ME301WG, NP-ME401XG, NP-ME361XG, NP-ME331XG, NP-ME301XG, NP-CA4155W, NP-CA4350X, NP-CA4255X, NP-CA4155X, NP-CA4115X, NP-MC331WG, NP-MC421XG, NP-MC401XG, NP-MC371XG, NP-MC331XG, NP-MC301XG, NP-CK4155W, NP-CK4255X, NP-CK4155X, NP-CK4055X, NP-CM4150X, NP-CM4050X, NP-CK4155WG, NP-CK4255XG, NP-CK4155XG, NP-CR2165W, NP-CR2305X, NP-CR2275X, NP-CR2165X, NP-CR2155X, NP-CD2115X, NP-CD2105X, NP-CM4151X, NP-CR2276X, NP-CD2116X, NP-P502H, NP-P502W, NP-P452H, NP-P452W
CriticalCVE-2025-15012: SQL Injection in code-projects Refugee Food Management System
MediumCVE-2025-15013: Stack-based Buffer Overflow in floooh sokol
MediumCVE-2025-15016: CWE-321 Use of Hard-coded Cryptographic Key in Ragic Enterprise Cloud Database
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.