CVE-2025-14156: CWE-20 Improper Input Validation in ays-pro Fox LMS – WordPress LMS Plugin
The Fox LMS – WordPress LMS Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.0.5.1. This is due to the plugin not properly validating the 'role' parameter when creating new users via the `/fox-lms/v1/payments/create-order` REST API endpoint. This makes it possible for unauthenticated attackers to create new user accounts with arbitrary roles, including administrator, leading to complete site compromise.
AI Analysis
Technical Summary
The Fox LMS – WordPress LMS Plugin, widely used for managing learning management systems on WordPress sites, contains a critical security vulnerability identified as CVE-2025-14156. This vulnerability stems from improper input validation (CWE-20) of the 'role' parameter in the REST API endpoint /fox-lms/v1/payments/create-order. Specifically, the plugin fails to verify or sanitize the role value when creating new user accounts, allowing attackers to specify arbitrary roles. Since the endpoint is accessible without authentication, an attacker can exploit this flaw remotely to create accounts with elevated privileges, including administrator roles. This results in a complete compromise of the WordPress site, enabling attackers to execute arbitrary code, steal data, or disrupt site operations. The vulnerability affects all versions up to and including 1.0.5.1, with version 1.0.4.7 explicitly mentioned. The CVSS v3.1 base score of 9.8 indicates a critical severity, with attack vector being network-based, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the simplicity and severity of the vulnerability make it a prime target for attackers once weaponized. The lack of a patch link suggests that a fix may not yet be publicly available, increasing urgency for mitigation.
Potential Impact
The impact of CVE-2025-14156 is severe for organizations utilizing the Fox LMS WordPress plugin. Successful exploitation grants attackers administrative access to the WordPress site, allowing them to fully control the site environment. This includes the ability to modify or delete content, install malicious plugins or backdoors, exfiltrate sensitive user and organizational data, and disrupt LMS operations. For educational institutions, training providers, and enterprises relying on Fox LMS for course delivery and user management, this could lead to significant operational disruption, reputational damage, and compliance violations. The vulnerability's ease of exploitation without authentication means that any exposed WordPress instance with the vulnerable plugin is at immediate risk. Additionally, attackers could leverage compromised sites as footholds for lateral movement within organizational networks or as platforms for further attacks such as phishing or malware distribution. The widespread use of WordPress globally and the popularity of LMS plugins amplify the potential scale of impact.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations for the presence of the Fox LMS plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate exposure. If disabling is not feasible, restricting access to the REST API endpoint /fox-lms/v1/payments/create-order via web application firewalls (WAFs) or server-level access controls can reduce risk. Monitoring WordPress user accounts for unauthorized creations or privilege escalations is critical. Implementing strict role assignment policies and logging all user management activities can help detect exploitation attempts. Organizations should subscribe to vendor advisories for prompt patch deployment once available. Additionally, isolating WordPress environments and limiting plugin installations to trusted sources reduces overall attack surface. Regular backups and incident response plans should be updated to prepare for potential compromises.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Brazil, Japan, Netherlands
CVE-2025-14156: CWE-20 Improper Input Validation in ays-pro Fox LMS – WordPress LMS Plugin
Description
The Fox LMS – WordPress LMS Plugin plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.0.5.1. This is due to the plugin not properly validating the 'role' parameter when creating new users via the `/fox-lms/v1/payments/create-order` REST API endpoint. This makes it possible for unauthenticated attackers to create new user accounts with arbitrary roles, including administrator, leading to complete site compromise.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Fox LMS – WordPress LMS Plugin, widely used for managing learning management systems on WordPress sites, contains a critical security vulnerability identified as CVE-2025-14156. This vulnerability stems from improper input validation (CWE-20) of the 'role' parameter in the REST API endpoint /fox-lms/v1/payments/create-order. Specifically, the plugin fails to verify or sanitize the role value when creating new user accounts, allowing attackers to specify arbitrary roles. Since the endpoint is accessible without authentication, an attacker can exploit this flaw remotely to create accounts with elevated privileges, including administrator roles. This results in a complete compromise of the WordPress site, enabling attackers to execute arbitrary code, steal data, or disrupt site operations. The vulnerability affects all versions up to and including 1.0.5.1, with version 1.0.4.7 explicitly mentioned. The CVSS v3.1 base score of 9.8 indicates a critical severity, with attack vector being network-based, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the simplicity and severity of the vulnerability make it a prime target for attackers once weaponized. The lack of a patch link suggests that a fix may not yet be publicly available, increasing urgency for mitigation.
Potential Impact
The impact of CVE-2025-14156 is severe for organizations utilizing the Fox LMS WordPress plugin. Successful exploitation grants attackers administrative access to the WordPress site, allowing them to fully control the site environment. This includes the ability to modify or delete content, install malicious plugins or backdoors, exfiltrate sensitive user and organizational data, and disrupt LMS operations. For educational institutions, training providers, and enterprises relying on Fox LMS for course delivery and user management, this could lead to significant operational disruption, reputational damage, and compliance violations. The vulnerability's ease of exploitation without authentication means that any exposed WordPress instance with the vulnerable plugin is at immediate risk. Additionally, attackers could leverage compromised sites as footholds for lateral movement within organizational networks or as platforms for further attacks such as phishing or malware distribution. The widespread use of WordPress globally and the popularity of LMS plugins amplify the potential scale of impact.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations for the presence of the Fox LMS plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate exposure. If disabling is not feasible, restricting access to the REST API endpoint /fox-lms/v1/payments/create-order via web application firewalls (WAFs) or server-level access controls can reduce risk. Monitoring WordPress user accounts for unauthorized creations or privilege escalations is critical. Implementing strict role assignment policies and logging all user management activities can help detect exploitation attempts. Organizations should subscribe to vendor advisories for prompt patch deployment once available. Additionally, isolating WordPress environments and limiting plugin installations to trusted sources reduces overall attack surface. Regular backups and incident response plans should be updated to prepare for potential compromises.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-05T20:32:01.682Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69401ef9d9bcdf3f3de12798
Added to database: 12/15/2025, 2:45:13 PM
Last enriched: 2/27/2026, 10:57:46 AM
Last updated: 3/25/2026, 5:18:22 PM
Views: 538
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.