Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15521: CWE-639 Authorization Bypass Through User-Controlled Key in kodezen Academy LMS – WordPress LMS Plugin for Complete eLearning Solution

0
Critical
VulnerabilityCVE-2025-15521cvecve-2025-15521cwe-639
Published: Wed Jan 21 2026 (01/21/2026, 01:23:31 UTC)
Source: CVE Database V5
Vendor/Project: kodezen
Product: Academy LMS – WordPress LMS Plugin for Complete eLearning Solution

Description

The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.5.0. This is due to the plugin not properly validating a user's identity prior to updating their password and relying solely on a publicly-exposed nonce for authorization. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and gain access to their account.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:20:18 UTC

Technical Analysis

The vulnerability identified as CVE-2025-15521 affects the Academy LMS plugin for WordPress, a widely used learning management system plugin designed to provide a complete eLearning solution. The core issue stems from improper authorization checks when updating user passwords. Specifically, the plugin relies solely on a publicly exposed nonce value for authorization, without verifying the identity of the user requesting the password change. This design flaw allows unauthenticated attackers to exploit the password update mechanism to change the passwords of arbitrary users, including administrators. As a result, attackers can gain unauthorized access to accounts, effectively escalating privileges and potentially taking over the entire LMS environment. The vulnerability is classified under CWE-639, which relates to authorization bypass through user-controlled keys. The CVSS 3.1 base score of 9.8 (critical) reflects the vulnerability's high impact and ease of exploitation: it requires no authentication (AV:N), no user interaction (UI:N), and has low attack complexity (AC:L). The impact includes full compromise of confidentiality, integrity, and availability of the affected system. Although no public exploits have been reported yet, the vulnerability's nature makes it a prime target for attackers seeking to compromise eLearning platforms. The vulnerability affects all versions up to and including 3.5.0 of the plugin, with no patches currently available at the time of reporting. The plugin’s widespread use in educational institutions and corporate training environments increases the risk profile for organizations relying on this software.

Potential Impact

For European organizations, the impact of this vulnerability is significant. Educational institutions, corporate training departments, and eLearning providers using the Academy LMS plugin are at risk of unauthorized account takeover, including administrative accounts. This can lead to unauthorized access to sensitive educational content, personal data of students and staff, and potentially the entire WordPress environment hosting the LMS. Attackers could manipulate course content, disrupt learning activities, or exfiltrate confidential information. The compromise of administrator accounts can also facilitate further lateral movement within the network or deployment of malware. Given the critical nature of the vulnerability and the ease of exploitation, the potential for widespread disruption and data breaches is high. Additionally, organizations may face regulatory consequences under GDPR if personal data is compromised. The lack of a patch at the time of disclosure increases the urgency for interim protective measures. The reputational damage and operational downtime resulting from exploitation could be severe, especially for institutions relying heavily on digital learning platforms.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the password update functionality within the plugin, such as limiting it to authenticated users or specific IP ranges via web application firewall (WAF) rules. 2. Monitor logs for unusual password change requests or account lockouts that could indicate exploitation attempts. 3. Disable or remove the vulnerable plugin if feasible until a patch is released. 4. Implement multi-factor authentication (MFA) on all administrative accounts to reduce the risk of account takeover even if passwords are changed. 5. Regularly back up LMS data and WordPress configurations to enable rapid recovery in case of compromise. 6. Stay informed on vendor updates and apply patches immediately once available. 7. Conduct a thorough audit of user accounts and permissions to identify any unauthorized changes post-disclosure. 8. Educate administrators and users about the vulnerability and encourage vigilance for suspicious activity. 9. Consider deploying additional endpoint detection and response (EDR) solutions to detect lateral movement or malicious activity following exploitation. 10. Review and harden WordPress security configurations, including limiting plugin installations to trusted sources and minimizing plugin usage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-14T15:32:20.670Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697034844623b1157c6ef998

Added to database: 1/21/2026, 2:05:56 AM

Last enriched: 1/21/2026, 2:20:18 AM

Last updated: 2/6/2026, 6:03:33 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats