CVE-2025-4800: CWE-434 Unrestricted Upload of File with Dangerous Type in StylemixThemes MasterStudy LMS Pro
The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-4800 is a high-severity vulnerability affecting the MasterStudy LMS Pro plugin for WordPress, developed by StylemixThemes. The vulnerability arises from improper file type validation in the function stm_lms_add_assignment_attachment, present in all versions up to and including 4.7.0. This flaw allows authenticated users with Subscriber-level privileges or higher to upload arbitrary files to the web server hosting the affected WordPress site. Because the plugin fails to restrict or validate the types of files uploaded, attackers can upload malicious files such as web shells or scripts that could be executed remotely. This can lead to remote code execution (RCE), compromising the confidentiality, integrity, and availability of the affected system. The CVSS v3.1 base score is 8.8, reflecting the network attack vector, low attack complexity, required privileges at the low subscriber level, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a critical risk for sites using this plugin. Since MasterStudy LMS Pro is a learning management system plugin, it is commonly used by educational institutions and corporate training platforms, which often contain sensitive user data and intellectual property. The vulnerability could be exploited to gain unauthorized access, deploy malware, deface websites, or pivot to other internal systems.
Potential Impact
For European organizations, especially educational institutions, e-learning providers, and enterprises using WordPress-based LMS solutions, this vulnerability poses a significant risk. Exploitation could lead to unauthorized data access, including personal data protected under GDPR, resulting in legal and financial repercussions. The ability to execute arbitrary code on the server could allow attackers to disrupt services, steal sensitive information, or use the compromised server as a foothold for further attacks within the organization's network. Given the widespread use of WordPress in Europe and the popularity of LMS plugins, the threat could impact a broad range of organizations from universities to corporate training departments. Additionally, disruption of educational services could have reputational damage and operational consequences. The lack of public exploits currently provides a window for mitigation, but the vulnerability's characteristics suggest it could be weaponized quickly once exploited in the wild.
Mitigation Recommendations
Organizations should immediately verify if they are using the MasterStudy LMS Pro plugin version 4.7.0 or earlier. Since no official patch links are currently available, administrators should monitor StylemixThemes’ official channels for updates or patches addressing this vulnerability. As an immediate mitigation, restrict plugin access to trusted users only and consider disabling file upload functionality if not essential. Implement web application firewall (WAF) rules to block suspicious file uploads and monitor logs for unusual upload activity. Employ strict file upload validation at the server level, such as limiting allowed MIME types and scanning uploaded files for malware. Segregate WordPress instances and limit permissions of user roles to the minimum necessary. Regularly back up website data and have an incident response plan ready in case of compromise. Finally, consider alternative LMS plugins with better security track records if a timely patch is not available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-4800: CWE-434 Unrestricted Upload of File with Dangerous Type in StylemixThemes MasterStudy LMS Pro
Description
The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-4800 is a high-severity vulnerability affecting the MasterStudy LMS Pro plugin for WordPress, developed by StylemixThemes. The vulnerability arises from improper file type validation in the function stm_lms_add_assignment_attachment, present in all versions up to and including 4.7.0. This flaw allows authenticated users with Subscriber-level privileges or higher to upload arbitrary files to the web server hosting the affected WordPress site. Because the plugin fails to restrict or validate the types of files uploaded, attackers can upload malicious files such as web shells or scripts that could be executed remotely. This can lead to remote code execution (RCE), compromising the confidentiality, integrity, and availability of the affected system. The CVSS v3.1 base score is 8.8, reflecting the network attack vector, low attack complexity, required privileges at the low subscriber level, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a critical risk for sites using this plugin. Since MasterStudy LMS Pro is a learning management system plugin, it is commonly used by educational institutions and corporate training platforms, which often contain sensitive user data and intellectual property. The vulnerability could be exploited to gain unauthorized access, deploy malware, deface websites, or pivot to other internal systems.
Potential Impact
For European organizations, especially educational institutions, e-learning providers, and enterprises using WordPress-based LMS solutions, this vulnerability poses a significant risk. Exploitation could lead to unauthorized data access, including personal data protected under GDPR, resulting in legal and financial repercussions. The ability to execute arbitrary code on the server could allow attackers to disrupt services, steal sensitive information, or use the compromised server as a foothold for further attacks within the organization's network. Given the widespread use of WordPress in Europe and the popularity of LMS plugins, the threat could impact a broad range of organizations from universities to corporate training departments. Additionally, disruption of educational services could have reputational damage and operational consequences. The lack of public exploits currently provides a window for mitigation, but the vulnerability's characteristics suggest it could be weaponized quickly once exploited in the wild.
Mitigation Recommendations
Organizations should immediately verify if they are using the MasterStudy LMS Pro plugin version 4.7.0 or earlier. Since no official patch links are currently available, administrators should monitor StylemixThemes’ official channels for updates or patches addressing this vulnerability. As an immediate mitigation, restrict plugin access to trusted users only and consider disabling file upload functionality if not essential. Implement web application firewall (WAF) rules to block suspicious file uploads and monitor logs for unusual upload activity. Employ strict file upload validation at the server level, such as limiting allowed MIME types and scanning uploaded files for malware. Segregate WordPress instances and limit permissions of user roles to the minimum necessary. Regularly back up website data and have an incident response plan ready in case of compromise. Finally, consider alternative LMS plugins with better security track records if a timely patch is not available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-15T19:46:25.446Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6836a280182aa0cae238f9b6
Added to database: 5/28/2025, 5:43:28 AM
Last enriched: 7/6/2025, 1:41:24 AM
Last updated: 8/16/2025, 10:20:19 AM
Views: 61
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.