CVE-2025-69359: Missing Authorization in WPFunnels Creator LMS
Missing Authorization vulnerability in WPFunnels Creator LMS creatorlms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Creator LMS: from n/a through <= 1.1.12.
AI Analysis
Technical Summary
CVE-2025-69359 is a Missing Authorization vulnerability identified in the WPFunnels Creator LMS product, affecting versions up to and including 1.1.12. The flaw arises from incorrectly configured access control security levels, allowing remote attackers to bypass authorization checks. Specifically, the vulnerability permits unauthenticated attackers to access certain resources or functionalities that should be restricted, leading to limited confidentiality breaches. The vulnerability has a CVSS 3.1 base score of 5.3, indicating medium severity, with an attack vector over the network, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality as the vulnerability does not affect integrity or availability. No known exploits have been reported in the wild, and no patches or mitigations have been officially released at the time of publication. The vulnerability highlights a common security misconfiguration in web applications where access control enforcement is incomplete or missing, emphasizing the need for rigorous authorization checks in LMS platforms that manage sensitive educational data and user information.
Potential Impact
For European organizations, the impact of CVE-2025-69359 primarily concerns the confidentiality of sensitive educational data managed within the Creator LMS platform. Unauthorized access could expose user information, course content, or administrative data, potentially leading to privacy violations and compliance issues under regulations such as GDPR. Although the vulnerability does not allow modification or disruption of services, the leakage of confidential information can damage organizational reputation and trust. Educational institutions, training providers, and enterprises relying on Creator LMS for learning management are at risk. The medium severity rating suggests that while the threat is not critical, it warrants timely attention to prevent exploitation, especially in sectors with stringent data protection requirements. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
Organizations should implement the following specific mitigations: 1) Conduct a thorough review of access control policies within the Creator LMS deployment to ensure all sensitive endpoints enforce proper authorization checks. 2) Restrict access to administrative and sensitive resources using role-based access control (RBAC) and principle of least privilege. 3) Monitor logs for unusual or unauthorized access attempts to detect potential exploitation attempts early. 4) Engage with the vendor or security community to obtain patches or updates addressing this vulnerability as soon as they become available. 5) If patches are not yet released, consider temporary compensating controls such as network segmentation, IP whitelisting, or web application firewalls (WAF) to limit exposure. 6) Educate LMS administrators on secure configuration practices and regularly audit system settings to prevent similar misconfigurations. 7) Maintain an incident response plan tailored to data confidentiality breaches in LMS environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-69359: Missing Authorization in WPFunnels Creator LMS
Description
Missing Authorization vulnerability in WPFunnels Creator LMS creatorlms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Creator LMS: from n/a through <= 1.1.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-69359 is a Missing Authorization vulnerability identified in the WPFunnels Creator LMS product, affecting versions up to and including 1.1.12. The flaw arises from incorrectly configured access control security levels, allowing remote attackers to bypass authorization checks. Specifically, the vulnerability permits unauthenticated attackers to access certain resources or functionalities that should be restricted, leading to limited confidentiality breaches. The vulnerability has a CVSS 3.1 base score of 5.3, indicating medium severity, with an attack vector over the network, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality as the vulnerability does not affect integrity or availability. No known exploits have been reported in the wild, and no patches or mitigations have been officially released at the time of publication. The vulnerability highlights a common security misconfiguration in web applications where access control enforcement is incomplete or missing, emphasizing the need for rigorous authorization checks in LMS platforms that manage sensitive educational data and user information.
Potential Impact
For European organizations, the impact of CVE-2025-69359 primarily concerns the confidentiality of sensitive educational data managed within the Creator LMS platform. Unauthorized access could expose user information, course content, or administrative data, potentially leading to privacy violations and compliance issues under regulations such as GDPR. Although the vulnerability does not allow modification or disruption of services, the leakage of confidential information can damage organizational reputation and trust. Educational institutions, training providers, and enterprises relying on Creator LMS for learning management are at risk. The medium severity rating suggests that while the threat is not critical, it warrants timely attention to prevent exploitation, especially in sectors with stringent data protection requirements. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
Organizations should implement the following specific mitigations: 1) Conduct a thorough review of access control policies within the Creator LMS deployment to ensure all sensitive endpoints enforce proper authorization checks. 2) Restrict access to administrative and sensitive resources using role-based access control (RBAC) and principle of least privilege. 3) Monitor logs for unusual or unauthorized access attempts to detect potential exploitation attempts early. 4) Engage with the vendor or security community to obtain patches or updates addressing this vulnerability as soon as they become available. 5) If patches are not yet released, consider temporary compensating controls such as network segmentation, IP whitelisting, or web application firewalls (WAF) to limit exposure. 6) Educate LMS administrators on secure configuration practices and regularly audit system settings to prevent similar misconfigurations. 7) Maintain an incident response plan tailored to data confidentiality breaches in LMS environments.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-31T20:12:32.245Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695d3e3a326bcb029a44a08e
Added to database: 1/6/2026, 4:54:18 PM
Last enriched: 1/21/2026, 2:04:07 AM
Last updated: 2/7/2026, 1:07:57 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.