CVE-2025-15521: CWE-639 Authorization Bypass Through User-Controlled Key in kodezen Academy LMS – WordPress LMS Plugin for Complete eLearning Solution
The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.5.0. This is due to the plugin not properly validating a user's identity prior to updating their password and relying solely on a publicly-exposed nonce for authorization. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and gain access to their account.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-15521 affects the Academy LMS plugin for WordPress, a widely used learning management system plugin designed to provide complete eLearning solutions. The root cause is an authorization bypass due to improper validation of user identity during password update operations. Specifically, the plugin relies solely on a publicly-exposed nonce token for authorization, which can be easily obtained or predicted by attackers. This design flaw allows unauthenticated attackers to submit password change requests for any user account, including high-privilege administrator accounts, without needing valid credentials or user interaction. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS v3.1 base score is 9.8 (critical), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, low attack complexity, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. The vulnerability affects all versions of the plugin up to 3.5.0. Although no public exploits are currently known, the ease of exploitation and potential impact make this a severe threat to WordPress sites running this plugin. Attackers exploiting this flaw can completely compromise LMS sites, steal sensitive educational data, manipulate course content, or disrupt service availability.
Potential Impact
The impact of CVE-2025-15521 is severe for organizations using the Academy LMS plugin on WordPress. Successful exploitation results in full account takeover, including administrator accounts, enabling attackers to control the entire WordPress site. This can lead to unauthorized access to sensitive educational data, modification or deletion of course materials, disruption of eLearning services, and potential lateral movement within the hosting environment. The compromise of administrator accounts also allows attackers to install backdoors, escalate privileges further, or pivot to other connected systems. Educational institutions, corporate training platforms, and any organization relying on this LMS plugin face risks of data breaches, reputational damage, and operational downtime. Given the plugin’s use in diverse sectors worldwide, the threat has broad implications for confidentiality, integrity, and availability of eLearning platforms.
Mitigation Recommendations
To mitigate this critical vulnerability, organizations should immediately upgrade the Academy LMS plugin to a patched version once released by the vendor. Until a patch is available, administrators should consider disabling the plugin or restricting access to the password update functionality via web application firewalls or custom access controls. Monitoring web server logs for suspicious password change requests and unusual account activity can help detect exploitation attempts. Implementing multi-factor authentication (MFA) for administrator accounts adds an additional security layer, reducing the risk of account takeover even if passwords are changed. Regular backups of WordPress sites and LMS data should be maintained to enable recovery from potential compromises. Security teams should also audit all user accounts for unauthorized changes and reset passwords where suspicious activity is detected. Finally, applying the principle of least privilege by limiting administrator accounts reduces the attack surface.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Japan, Netherlands, Italy, Spain
CVE-2025-15521: CWE-639 Authorization Bypass Through User-Controlled Key in kodezen Academy LMS – WordPress LMS Plugin for Complete eLearning Solution
Description
The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.5.0. This is due to the plugin not properly validating a user's identity prior to updating their password and relying solely on a publicly-exposed nonce for authorization. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and gain access to their account.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-15521 affects the Academy LMS plugin for WordPress, a widely used learning management system plugin designed to provide complete eLearning solutions. The root cause is an authorization bypass due to improper validation of user identity during password update operations. Specifically, the plugin relies solely on a publicly-exposed nonce token for authorization, which can be easily obtained or predicted by attackers. This design flaw allows unauthenticated attackers to submit password change requests for any user account, including high-privilege administrator accounts, without needing valid credentials or user interaction. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS v3.1 base score is 9.8 (critical), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, low attack complexity, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. The vulnerability affects all versions of the plugin up to 3.5.0. Although no public exploits are currently known, the ease of exploitation and potential impact make this a severe threat to WordPress sites running this plugin. Attackers exploiting this flaw can completely compromise LMS sites, steal sensitive educational data, manipulate course content, or disrupt service availability.
Potential Impact
The impact of CVE-2025-15521 is severe for organizations using the Academy LMS plugin on WordPress. Successful exploitation results in full account takeover, including administrator accounts, enabling attackers to control the entire WordPress site. This can lead to unauthorized access to sensitive educational data, modification or deletion of course materials, disruption of eLearning services, and potential lateral movement within the hosting environment. The compromise of administrator accounts also allows attackers to install backdoors, escalate privileges further, or pivot to other connected systems. Educational institutions, corporate training platforms, and any organization relying on this LMS plugin face risks of data breaches, reputational damage, and operational downtime. Given the plugin’s use in diverse sectors worldwide, the threat has broad implications for confidentiality, integrity, and availability of eLearning platforms.
Mitigation Recommendations
To mitigate this critical vulnerability, organizations should immediately upgrade the Academy LMS plugin to a patched version once released by the vendor. Until a patch is available, administrators should consider disabling the plugin or restricting access to the password update functionality via web application firewalls or custom access controls. Monitoring web server logs for suspicious password change requests and unusual account activity can help detect exploitation attempts. Implementing multi-factor authentication (MFA) for administrator accounts adds an additional security layer, reducing the risk of account takeover even if passwords are changed. Regular backups of WordPress sites and LMS data should be maintained to enable recovery from potential compromises. Security teams should also audit all user accounts for unauthorized changes and reset passwords where suspicious activity is detected. Finally, applying the principle of least privilege by limiting administrator accounts reduces the attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-14T15:32:20.670Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697034844623b1157c6ef998
Added to database: 1/21/2026, 2:05:56 AM
Last enriched: 2/27/2026, 12:02:47 PM
Last updated: 3/25/2026, 2:22:19 AM
Views: 197
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.