CVE-2025-13956: CWE-862 Missing Authorization in thimpress LearnPress – WordPress LMS Plugin
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the statistic function in all versions up to, and including, 4.3.1. This makes it possible for unauthenticated attackers to view the plugin's orders statistics, including total revenue summaries and order status counts
AI Analysis
Technical Summary
CVE-2025-13956 is a vulnerability classified under CWE-862 (Missing Authorization) found in the LearnPress WordPress LMS plugin developed by thimpress. The flaw exists because the plugin fails to perform a capability check on its statistics function, which is responsible for displaying order-related data such as total revenue and order status counts. This missing authorization check allows unauthenticated attackers to access sensitive business data without any credentials or user interaction. The vulnerability affects all versions of LearnPress up to and including 4.3.1. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), with no impact on integrity or availability. Although there are no known exploits in the wild, the exposure of financial statistics could aid attackers in reconnaissance or social engineering campaigns. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for defensive measures. This vulnerability is particularly relevant for organizations using LearnPress for e-learning management on WordPress, as it leaks sensitive order data that could be leveraged for competitive intelligence or fraud.
Potential Impact
For European organizations, the unauthorized exposure of order statistics can lead to several risks. Confidential business information such as revenue figures and order statuses can be used by competitors or malicious actors to gain insights into business performance and customer behavior. This could facilitate targeted phishing or social engineering attacks against staff or customers. While the vulnerability does not allow data modification or service disruption, the confidentiality breach undermines trust and may violate data protection regulations if personal data is indirectly exposed. Organizations relying on LearnPress for educational services or training may face reputational damage if sensitive financial data is leaked. The impact is heightened for organizations with significant e-learning operations or those in competitive sectors where financial secrecy is critical. Additionally, the vulnerability could be exploited as part of a broader attack chain, making early mitigation important.
Mitigation Recommendations
Since no official patch is currently linked, organizations should implement immediate compensating controls. These include restricting access to the LearnPress statistics endpoints via web application firewalls (WAFs) or server-level access controls to allow only trusted IP addresses or authenticated users. Administrators should audit and limit plugin permissions and consider disabling the statistics feature if not essential. Monitoring web server logs for unusual access patterns to the statistics function can help detect exploitation attempts. Organizations should also plan to update LearnPress promptly once a security patch is released. Additionally, isolating the WordPress environment and employing network segmentation can reduce exposure. Regular backups and security audits of WordPress plugins are recommended to maintain overall security hygiene.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13956: CWE-862 Missing Authorization in thimpress LearnPress – WordPress LMS Plugin
Description
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the statistic function in all versions up to, and including, 4.3.1. This makes it possible for unauthenticated attackers to view the plugin's orders statistics, including total revenue summaries and order status counts
AI-Powered Analysis
Technical Analysis
CVE-2025-13956 is a vulnerability classified under CWE-862 (Missing Authorization) found in the LearnPress WordPress LMS plugin developed by thimpress. The flaw exists because the plugin fails to perform a capability check on its statistics function, which is responsible for displaying order-related data such as total revenue and order status counts. This missing authorization check allows unauthenticated attackers to access sensitive business data without any credentials or user interaction. The vulnerability affects all versions of LearnPress up to and including 4.3.1. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), with no impact on integrity or availability. Although there are no known exploits in the wild, the exposure of financial statistics could aid attackers in reconnaissance or social engineering campaigns. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for defensive measures. This vulnerability is particularly relevant for organizations using LearnPress for e-learning management on WordPress, as it leaks sensitive order data that could be leveraged for competitive intelligence or fraud.
Potential Impact
For European organizations, the unauthorized exposure of order statistics can lead to several risks. Confidential business information such as revenue figures and order statuses can be used by competitors or malicious actors to gain insights into business performance and customer behavior. This could facilitate targeted phishing or social engineering attacks against staff or customers. While the vulnerability does not allow data modification or service disruption, the confidentiality breach undermines trust and may violate data protection regulations if personal data is indirectly exposed. Organizations relying on LearnPress for educational services or training may face reputational damage if sensitive financial data is leaked. The impact is heightened for organizations with significant e-learning operations or those in competitive sectors where financial secrecy is critical. Additionally, the vulnerability could be exploited as part of a broader attack chain, making early mitigation important.
Mitigation Recommendations
Since no official patch is currently linked, organizations should implement immediate compensating controls. These include restricting access to the LearnPress statistics endpoints via web application firewalls (WAFs) or server-level access controls to allow only trusted IP addresses or authenticated users. Administrators should audit and limit plugin permissions and consider disabling the statistics feature if not essential. Monitoring web server logs for unusual access patterns to the statistics function can help detect exploitation attempts. Organizations should also plan to update LearnPress promptly once a security patch is released. Additionally, isolating the WordPress environment and employing network segmentation can reduce exposure. Regular backups and security audits of WordPress plugins are recommended to maintain overall security hygiene.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-03T13:31:00.543Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6940e3e754c229a9f5d4c70f
Added to database: 12/16/2025, 4:45:27 AM
Last enriched: 12/16/2025, 5:00:15 AM
Last updated: 12/16/2025, 11:31:57 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-3261
LowCVE-2025-0836: CWE-862 Missing Authorization in Milestone Systems XProtect VMS
MediumUser Data Compromised in SoundCloud Hack
MediumCVE-2025-14002: CWE-287 Improper Authentication in whyun WPCOM Member
HighCVE-2025-13231: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in radykal Fancy Product Designer
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.