Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13956: CWE-862 Missing Authorization in thimpress LearnPress – WordPress LMS Plugin

0
Medium
VulnerabilityCVE-2025-13956cvecve-2025-13956cwe-862
Published: Tue Dec 16 2025 (12/16/2025, 04:31:35 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: LearnPress – WordPress LMS Plugin

Description

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the statistic function in all versions up to, and including, 4.3.1. This makes it possible for unauthenticated attackers to view the plugin's orders statistics, including total revenue summaries and order status counts

AI-Powered Analysis

AILast updated: 12/23/2025, 05:58:52 UTC

Technical Analysis

CVE-2025-13956 is a vulnerability classified under CWE-862 (Missing Authorization) found in the LearnPress plugin for WordPress, a widely used Learning Management System (LMS) plugin. The issue stems from the absence of a capability check on the statistics function, which is responsible for displaying order-related data such as total revenue summaries and order status counts. Because this function lacks proper authorization controls, unauthenticated attackers can remotely access sensitive business data without needing any credentials or user interaction. The vulnerability affects all versions up to and including 4.3.1 of LearnPress. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the fact that the attack vector is network-based, requires no privileges or user interaction, and impacts confidentiality only, without affecting integrity or availability. Although the vulnerability does not allow attackers to modify data or disrupt service, the unauthorized disclosure of financial and order information can provide valuable intelligence for further attacks, such as social engineering or targeted phishing campaigns. No patches or official fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability was publicly disclosed on December 16, 2025, by Wordfence. Organizations using LearnPress for managing online courses and transactions should be aware of this exposure and take immediate steps to protect sensitive data.

Potential Impact

For European organizations, the unauthorized disclosure of order statistics and revenue data can have several negative consequences. Confidential business information leakage can lead to competitive disadvantages, as attackers or competitors gain insight into sales volumes and financial performance. Additionally, exposure of order status counts may reveal operational details that could be exploited for social engineering or targeted attacks against customers or staff. Although the vulnerability does not allow direct system compromise or data modification, the loss of confidentiality can erode customer trust and damage brand reputation. Educational institutions and e-learning providers relying on LearnPress to manage course enrollments and payments are particularly at risk. The impact is heightened in sectors where financial data confidentiality is critical, such as private education providers or corporate training platforms. Given the widespread use of WordPress and LearnPress in Europe, the scope of affected systems could be significant, especially in countries with large e-learning markets. The lack of authentication or user interaction requirements makes exploitation straightforward, increasing the likelihood of opportunistic attacks if the vulnerability is not addressed.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their LearnPress plugin versions and upgrade to a patched release once available. In the absence of an official patch, administrators can implement temporary access controls by restricting access to the statistics endpoint via web server configuration or firewall rules, limiting it to trusted IP addresses or authenticated users only. Reviewing and hardening WordPress user roles and capabilities to ensure that only authorized personnel can access sensitive plugin functions is critical. Monitoring web server logs for unusual or repeated access attempts to the statistics function can help detect exploitation attempts early. Additionally, organizations should consider deploying Web Application Firewalls (WAFs) with custom rules to block unauthorized requests targeting the vulnerable endpoint. Educating staff about the risks of information leakage and reinforcing security best practices around plugin management and updates will further reduce exposure. Finally, maintaining regular backups and incident response plans will help organizations respond effectively if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-03T13:31:00.543Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6940e3e754c229a9f5d4c70f

Added to database: 12/16/2025, 4:45:27 AM

Last enriched: 12/23/2025, 5:58:52 AM

Last updated: 2/4/2026, 8:26:06 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats