Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13766: CWE-862 Missing Authorization in stylemix MasterStudy LMS WordPress Plugin – for Online Courses and Education

0
Medium
VulnerabilityCVE-2025-13766cvecve-2025-13766cwe-862
Published: Tue Jan 06 2026 (01/06/2026, 08:21:48 UTC)
Source: CVE Database V5
Vendor/Project: stylemix
Product: MasterStudy LMS WordPress Plugin – for Online Courses and Education

Description

The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to unauthorized modification and deletion of data due to a missing capability checks on multiple REST API endpoints in all versions up to, and including, 3.7.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload or delete arbitrary media files, delete or modify posts, and create/manage course templates

AI-Powered Analysis

AILast updated: 01/06/2026, 08:52:53 UTC

Technical Analysis

CVE-2025-13766 is a vulnerability classified under CWE-862 (Missing Authorization) found in the MasterStudy LMS WordPress plugin, which is widely used for managing online courses and educational content. The flaw exists because the plugin fails to enforce proper capability checks on multiple REST API endpoints. This lack of authorization validation allows any authenticated user with at least Subscriber-level privileges to perform unauthorized actions such as uploading or deleting arbitrary media files, deleting or modifying posts, and creating or managing course templates. Since WordPress Subscriber roles are typically assigned to users with minimal privileges, this vulnerability significantly lowers the barrier for attackers to escalate their impact within affected systems. The vulnerability affects all versions up to and including 3.7.6 of the plugin. The attack vector is network-based and does not require user interaction, making it easier to exploit remotely. The CVSS 3.1 base score is 5.4, indicating a medium severity level, with low attack complexity and no user interaction required. The impact primarily affects confidentiality and integrity, as unauthorized data modification and deletion can disrupt educational content and user trust. No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly to prevent potential exploitation.

Potential Impact

For European organizations, especially educational institutions and e-learning providers using the MasterStudy LMS plugin, this vulnerability poses a significant risk to the integrity and confidentiality of their online course content and user data. Unauthorized modification or deletion of course materials can disrupt learning processes, damage institutional reputation, and lead to loss of trust among students and educators. The ability to upload arbitrary media files could also be leveraged to introduce malicious content or malware into the platform. Since the vulnerability can be exploited by users with minimal privileges, insider threats or compromised low-level accounts could lead to substantial damage. Additionally, unauthorized changes to course templates may affect the delivery and structure of educational programs, potentially causing compliance issues with educational standards or regulations. The absence of availability impact reduces the risk of service outages but does not diminish the seriousness of data integrity and confidentiality breaches. Given the widespread use of WordPress and the popularity of this plugin in European e-learning markets, the threat is relevant and requires immediate attention.

Mitigation Recommendations

1. Immediately update the MasterStudy LMS plugin to a version that addresses this vulnerability once a patch is released by the vendor. 2. Until a patch is available, restrict access to the WordPress REST API endpoints related to the plugin by implementing web application firewall (WAF) rules or custom access controls limiting REST API usage to trusted roles only. 3. Review and tighten user role assignments, ensuring that Subscriber-level users have minimal permissions and that only trusted users have elevated roles capable of modifying course content. 4. Monitor logs for unusual activity related to media uploads, post modifications, and course template changes to detect potential exploitation attempts. 5. Employ multi-factor authentication (MFA) for all user accounts to reduce the risk of account compromise. 6. Conduct regular backups of course content and media files to enable recovery in case of unauthorized deletions or modifications. 7. Educate administrators and content managers about the vulnerability and encourage vigilance in monitoring user activities within the LMS environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-27T16:40:43.878Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695cc9de3839e44175ff5dba

Added to database: 1/6/2026, 8:37:50 AM

Last enriched: 1/6/2026, 8:52:53 AM

Last updated: 1/8/2026, 10:41:45 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats