Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14156: CWE-20 Improper Input Validation in ays-pro Fox LMS – WordPress LMS Plugin

0
Critical
VulnerabilityCVE-2025-14156cvecve-2025-14156cwe-20
Published: Mon Dec 15 2025 (12/15/2025, 14:25:13 UTC)
Source: CVE Database V5
Vendor/Project: ays-pro
Product: Fox LMS – WordPress LMS Plugin

Description

The Fox LMS – WordPress LMS Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.0.5.1. This is due to the plugin not properly validating the 'role' parameter when creating new users via the `/fox-lms/v1/payments/create-order` REST API endpoint. This makes it possible for unauthenticated attackers to create new user accounts with arbitrary roles, including administrator, leading to complete site compromise.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 10:57:46 UTC

Technical Analysis

The Fox LMS – WordPress LMS Plugin, widely used for managing learning management systems on WordPress sites, contains a critical security vulnerability identified as CVE-2025-14156. This vulnerability stems from improper input validation (CWE-20) of the 'role' parameter in the REST API endpoint /fox-lms/v1/payments/create-order. Specifically, the plugin fails to verify or sanitize the role value when creating new user accounts, allowing attackers to specify arbitrary roles. Since the endpoint is accessible without authentication, an attacker can exploit this flaw remotely to create accounts with elevated privileges, including administrator roles. This results in a complete compromise of the WordPress site, enabling attackers to execute arbitrary code, steal data, or disrupt site operations. The vulnerability affects all versions up to and including 1.0.5.1, with version 1.0.4.7 explicitly mentioned. The CVSS v3.1 base score of 9.8 indicates a critical severity, with attack vector being network-based, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the simplicity and severity of the vulnerability make it a prime target for attackers once weaponized. The lack of a patch link suggests that a fix may not yet be publicly available, increasing urgency for mitigation.

Potential Impact

The impact of CVE-2025-14156 is severe for organizations utilizing the Fox LMS WordPress plugin. Successful exploitation grants attackers administrative access to the WordPress site, allowing them to fully control the site environment. This includes the ability to modify or delete content, install malicious plugins or backdoors, exfiltrate sensitive user and organizational data, and disrupt LMS operations. For educational institutions, training providers, and enterprises relying on Fox LMS for course delivery and user management, this could lead to significant operational disruption, reputational damage, and compliance violations. The vulnerability's ease of exploitation without authentication means that any exposed WordPress instance with the vulnerable plugin is at immediate risk. Additionally, attackers could leverage compromised sites as footholds for lateral movement within organizational networks or as platforms for further attacks such as phishing or malware distribution. The widespread use of WordPress globally and the popularity of LMS plugins amplify the potential scale of impact.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations for the presence of the Fox LMS plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate exposure. If disabling is not feasible, restricting access to the REST API endpoint /fox-lms/v1/payments/create-order via web application firewalls (WAFs) or server-level access controls can reduce risk. Monitoring WordPress user accounts for unauthorized creations or privilege escalations is critical. Implementing strict role assignment policies and logging all user management activities can help detect exploitation attempts. Organizations should subscribe to vendor advisories for prompt patch deployment once available. Additionally, isolating WordPress environments and limiting plugin installations to trusted sources reduces overall attack surface. Regular backups and incident response plans should be updated to prepare for potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-05T20:32:01.682Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69401ef9d9bcdf3f3de12798

Added to database: 12/15/2025, 2:45:13 PM

Last enriched: 2/27/2026, 10:57:46 AM

Last updated: 3/25/2026, 5:18:22 PM

Views: 538

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses