Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13766: CWE-862 Missing Authorization in stylemix MasterStudy LMS WordPress Plugin – for Online Courses and Education

0
Medium
VulnerabilityCVE-2025-13766cvecve-2025-13766cwe-862
Published: Tue Jan 06 2026 (01/06/2026, 08:21:48 UTC)
Source: CVE Database V5
Vendor/Project: stylemix
Product: MasterStudy LMS WordPress Plugin – for Online Courses and Education

Description

The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to unauthorized modification and deletion of data due to a missing capability checks on multiple REST API endpoints in all versions up to, and including, 3.7.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload or delete arbitrary media files, delete or modify posts, and create/manage course templates

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:18:52 UTC

Technical Analysis

CVE-2025-13766 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the MasterStudy LMS WordPress plugin, widely used for managing online courses and education content. The flaw exists due to missing capability checks on several REST API endpoints in all plugin versions up to and including 3.7.6. This security gap allows any authenticated user with at least Subscriber-level privileges to bypass intended access controls and perform unauthorized operations such as uploading or deleting arbitrary media files, deleting or modifying posts, and creating or managing course templates. The vulnerability is exploitable remotely without requiring additional user interaction, leveraging the REST API's network accessibility. The CVSS v3.1 base score is 5.4 (medium), reflecting low complexity of attack (AC:L), network attack vector (AV:N), and low privileges required (PR:L), but limited impact on availability (A:N) and moderate impact on confidentiality and integrity (C:L/I:L). The absence of patch links suggests a patch may not yet be publicly available, increasing the urgency for mitigation. This vulnerability could be exploited to disrupt course content, manipulate educational materials, or introduce malicious media files, undermining the integrity and trustworthiness of affected e-learning platforms.

Potential Impact

The primary impact of CVE-2025-13766 is unauthorized modification and deletion of educational content and media within affected WordPress sites using the MasterStudy LMS plugin. This can lead to loss of critical course data, defacement of educational materials, and potential insertion of malicious content, which could harm students and educators relying on the platform. While the vulnerability does not directly affect system availability, the integrity and confidentiality of course content are compromised. Organizations may face reputational damage, loss of user trust, and potential regulatory compliance issues related to data integrity. Attackers with low-level access can escalate their influence within the LMS environment, potentially facilitating further attacks or data exfiltration. The risk is particularly acute for institutions heavily dependent on this plugin for delivering online education, including universities, training providers, and corporate learning platforms.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict user roles to the minimum necessary privileges, especially limiting Subscriber-level users from accessing REST API endpoints related to course management and media uploads. Implementing Web Application Firewalls (WAFs) with custom rules to block suspicious REST API calls can provide temporary protection. Monitoring and auditing REST API usage logs for unusual activity is critical to detect exploitation attempts. Administrators should stay alert for official patches or updates from the vendor and apply them promptly once available. If a patch is not yet released, consider disabling or restricting the vulnerable REST API endpoints via custom code or security plugins. Additionally, enforce strong authentication and consider multi-factor authentication for all users with elevated privileges to reduce the risk of compromised accounts. Regular backups of course content and media files are essential to enable recovery from unauthorized modifications or deletions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-27T16:40:43.878Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695cc9de3839e44175ff5dba

Added to database: 1/6/2026, 8:37:50 AM

Last enriched: 2/27/2026, 10:18:52 AM

Last updated: 3/21/2026, 11:38:12 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses