Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14802: CWE-639 Authorization Bypass Through User-Controlled Key in thimpress LearnPress – WordPress LMS Plugin

0
Medium
VulnerabilityCVE-2025-14802cvecve-2025-14802cwe-639
Published: Wed Jan 07 2026 (01/07/2026, 07:17:33 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: LearnPress – WordPress LMS Plugin

Description

The LearnPress – WordPress LMS Plugin for WordPress is vulnerable to unauthorized file deletion in versions up to, and including, 4.3.2.2 via the /wp-json/lp/v1/material/{file_id} REST API endpoint. This is due to a parameter mismatch between the DELETE operation and authorization check, where the endpoint uses file_id from the URL path but the permission callback validates item_id from the request body. This makes it possible for authenticated attackers, with teacher-level access, to delete arbitrary lesson material files uploaded by other teachers via sending a DELETE request with their own item_id (to pass authorization) while targeting another teacher's file_id.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:36:31 UTC

Technical Analysis

The LearnPress plugin for WordPress, widely used for managing online learning content, contains a critical authorization bypass vulnerability identified as CVE-2025-14802. This vulnerability exists in the REST API endpoint /wp-json/lp/v1/material/{file_id}, which handles deletion of lesson material files. The DELETE operation uses the file_id parameter from the URL path to identify the target file for deletion. However, the authorization check incorrectly validates permissions against the item_id parameter supplied in the request body rather than the file_id. This parameter mismatch allows an authenticated user with teacher-level privileges to craft a DELETE request where the item_id corresponds to a resource they are authorized to manage, but the file_id targets a different teacher's file. As a result, the attacker can delete arbitrary lesson materials uploaded by other teachers without proper authorization. The vulnerability affects all versions up to and including 4.3.2.2 of LearnPress. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) indicates network exploitability with low attack complexity, requiring privileges but no user interaction, and impacts integrity and availability without affecting confidentiality. No public exploits are known at this time, but the flaw poses a significant risk to the integrity and availability of educational content managed via LearnPress.

Potential Impact

This vulnerability can have a substantial impact on organizations using LearnPress to deliver online courses. Unauthorized deletion of lesson materials can disrupt course delivery, degrade the learning experience, and cause data loss. Educational institutions, training providers, and enterprises relying on LearnPress for LMS functionality may face operational interruptions and reputational damage. Since the exploit requires only teacher-level authentication, insider threats or compromised teacher accounts can be leveraged to cause damage. The integrity of course content is compromised, and availability is affected as critical learning materials may be removed without trace. Although confidentiality is not impacted, the loss of educational resources can lead to significant remediation efforts and potential financial costs associated with content restoration and incident response.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update LearnPress to a patched version once available from the vendor. In the absence of an official patch, administrators can implement the following specific mitigations: 1) Restrict teacher-level permissions to only trusted users and monitor their activities closely. 2) Employ Web Application Firewalls (WAF) with custom rules to detect and block DELETE requests to /wp-json/lp/v1/material/ endpoints where the file_id and item_id parameters mismatch. 3) Conduct regular audits of REST API usage logs to identify suspicious deletion attempts. 4) Disable or restrict REST API access for users who do not require it, especially for deletion operations. 5) Consider implementing additional authorization checks via custom code or plugins that validate the file_id against the authenticated user's permissions before allowing deletion. 6) Educate teachers and administrators about the risks of credential compromise and enforce strong authentication mechanisms such as MFA. These targeted actions go beyond generic advice and address the specific nature of the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-16T20:58:27.037Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e0d1ea55ed4ed99880fe4

Added to database: 1/7/2026, 7:37:02 AM

Last enriched: 2/27/2026, 11:36:31 AM

Last updated: 3/24/2026, 5:32:51 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses