CVE-2025-13766: CWE-862 Missing Authorization in stylemix MasterStudy LMS WordPress Plugin – for Online Courses and Education
The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to unauthorized modification and deletion of data due to a missing capability checks on multiple REST API endpoints in all versions up to, and including, 3.7.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload or delete arbitrary media files, delete or modify posts, and create/manage course templates
AI Analysis
Technical Summary
CVE-2025-13766 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the MasterStudy LMS WordPress plugin, widely used for managing online courses and education content. The flaw exists due to missing capability checks on several REST API endpoints in all plugin versions up to and including 3.7.6. This security gap allows any authenticated user with at least Subscriber-level privileges to bypass intended access controls and perform unauthorized operations such as uploading or deleting arbitrary media files, deleting or modifying posts, and creating or managing course templates. The vulnerability is exploitable remotely without requiring additional user interaction, leveraging the REST API's network accessibility. The CVSS v3.1 base score is 5.4 (medium), reflecting low complexity of attack (AC:L), network attack vector (AV:N), and low privileges required (PR:L), but limited impact on availability (A:N) and moderate impact on confidentiality and integrity (C:L/I:L). The absence of patch links suggests a patch may not yet be publicly available, increasing the urgency for mitigation. This vulnerability could be exploited to disrupt course content, manipulate educational materials, or introduce malicious media files, undermining the integrity and trustworthiness of affected e-learning platforms.
Potential Impact
The primary impact of CVE-2025-13766 is unauthorized modification and deletion of educational content and media within affected WordPress sites using the MasterStudy LMS plugin. This can lead to loss of critical course data, defacement of educational materials, and potential insertion of malicious content, which could harm students and educators relying on the platform. While the vulnerability does not directly affect system availability, the integrity and confidentiality of course content are compromised. Organizations may face reputational damage, loss of user trust, and potential regulatory compliance issues related to data integrity. Attackers with low-level access can escalate their influence within the LMS environment, potentially facilitating further attacks or data exfiltration. The risk is particularly acute for institutions heavily dependent on this plugin for delivering online education, including universities, training providers, and corporate learning platforms.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict user roles to the minimum necessary privileges, especially limiting Subscriber-level users from accessing REST API endpoints related to course management and media uploads. Implementing Web Application Firewalls (WAFs) with custom rules to block suspicious REST API calls can provide temporary protection. Monitoring and auditing REST API usage logs for unusual activity is critical to detect exploitation attempts. Administrators should stay alert for official patches or updates from the vendor and apply them promptly once available. If a patch is not yet released, consider disabling or restricting the vulnerable REST API endpoints via custom code or security plugins. Additionally, enforce strong authentication and consider multi-factor authentication for all users with elevated privileges to reduce the risk of compromised accounts. Regular backups of course content and media files are essential to enable recovery from unauthorized modifications or deletions.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Japan
CVE-2025-13766: CWE-862 Missing Authorization in stylemix MasterStudy LMS WordPress Plugin – for Online Courses and Education
Description
The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to unauthorized modification and deletion of data due to a missing capability checks on multiple REST API endpoints in all versions up to, and including, 3.7.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload or delete arbitrary media files, delete or modify posts, and create/manage course templates
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13766 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the MasterStudy LMS WordPress plugin, widely used for managing online courses and education content. The flaw exists due to missing capability checks on several REST API endpoints in all plugin versions up to and including 3.7.6. This security gap allows any authenticated user with at least Subscriber-level privileges to bypass intended access controls and perform unauthorized operations such as uploading or deleting arbitrary media files, deleting or modifying posts, and creating or managing course templates. The vulnerability is exploitable remotely without requiring additional user interaction, leveraging the REST API's network accessibility. The CVSS v3.1 base score is 5.4 (medium), reflecting low complexity of attack (AC:L), network attack vector (AV:N), and low privileges required (PR:L), but limited impact on availability (A:N) and moderate impact on confidentiality and integrity (C:L/I:L). The absence of patch links suggests a patch may not yet be publicly available, increasing the urgency for mitigation. This vulnerability could be exploited to disrupt course content, manipulate educational materials, or introduce malicious media files, undermining the integrity and trustworthiness of affected e-learning platforms.
Potential Impact
The primary impact of CVE-2025-13766 is unauthorized modification and deletion of educational content and media within affected WordPress sites using the MasterStudy LMS plugin. This can lead to loss of critical course data, defacement of educational materials, and potential insertion of malicious content, which could harm students and educators relying on the platform. While the vulnerability does not directly affect system availability, the integrity and confidentiality of course content are compromised. Organizations may face reputational damage, loss of user trust, and potential regulatory compliance issues related to data integrity. Attackers with low-level access can escalate their influence within the LMS environment, potentially facilitating further attacks or data exfiltration. The risk is particularly acute for institutions heavily dependent on this plugin for delivering online education, including universities, training providers, and corporate learning platforms.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict user roles to the minimum necessary privileges, especially limiting Subscriber-level users from accessing REST API endpoints related to course management and media uploads. Implementing Web Application Firewalls (WAFs) with custom rules to block suspicious REST API calls can provide temporary protection. Monitoring and auditing REST API usage logs for unusual activity is critical to detect exploitation attempts. Administrators should stay alert for official patches or updates from the vendor and apply them promptly once available. If a patch is not yet released, consider disabling or restricting the vulnerable REST API endpoints via custom code or security plugins. Additionally, enforce strong authentication and consider multi-factor authentication for all users with elevated privileges to reduce the risk of compromised accounts. Regular backups of course content and media files are essential to enable recovery from unauthorized modifications or deletions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-27T16:40:43.878Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695cc9de3839e44175ff5dba
Added to database: 1/6/2026, 8:37:50 AM
Last enriched: 2/27/2026, 10:18:52 AM
Last updated: 3/21/2026, 11:38:12 AM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.