Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69359: Missing Authorization in WPFunnels Creator LMS

0
Unknown
VulnerabilityCVE-2025-69359cvecve-2025-69359
Published: Tue Jan 06 2026 (01/06/2026, 16:36:41 UTC)
Source: CVE Database V5
Vendor/Project: WPFunnels
Product: Creator LMS

Description

Missing Authorization vulnerability in WPFunnels Creator LMS creatorlms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Creator LMS: from n/a through <= 1.1.12.

AI-Powered Analysis

AILast updated: 01/06/2026, 17:07:38 UTC

Technical Analysis

CVE-2025-69359 identifies a Missing Authorization vulnerability in the WPFunnels Creator LMS product, affecting versions up to and including 1.1.12. The vulnerability arises from incorrectly configured access control security levels, which means that certain functions or resources within the LMS can be accessed without proper authorization checks. This type of flaw typically allows attackers to perform unauthorized actions such as viewing, modifying, or deleting data, or executing administrative functions that should be restricted. Since Creator LMS is a WordPress-based learning management system, it is often used by educational institutions and corporate training environments to manage courses, users, and content. The absence of a CVSS score indicates that the vulnerability has not yet been fully assessed for severity, and no patches or known exploits have been publicly disclosed at the time of publication. However, missing authorization vulnerabilities are generally considered serious because they can lead to privilege escalation and data breaches. The technical details confirm that the issue is related to access control misconfiguration rather than a code execution or injection flaw, meaning the attack vector involves bypassing security checks rather than exploiting software bugs. The vulnerability was reserved at the end of 2025 and published in early 2026, suggesting recent discovery and disclosure. Organizations using Creator LMS should be aware that this vulnerability could compromise the confidentiality and integrity of their learning management environments if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-69359 could be significant, especially for educational institutions, corporate training departments, and e-learning providers relying on Creator LMS. Unauthorized access could lead to exposure of sensitive user data, including personal information of students and employees, as well as proprietary training materials. Integrity of course content could be compromised, allowing attackers to alter or delete learning modules, which may disrupt training programs and damage organizational reputation. Additionally, unauthorized administrative access could enable attackers to create or modify user accounts, potentially facilitating further attacks or persistent access. The availability impact is likely limited unless attackers deliberately disrupt LMS operations. Given the increasing reliance on digital learning platforms across Europe, this vulnerability poses a risk to data privacy compliance under GDPR and could lead to regulatory penalties if exploited. The lack of known exploits currently reduces immediate risk, but the ease of exploitation due to missing authorization controls means attackers could develop exploits rapidly once the vulnerability is public knowledge.

Mitigation Recommendations

European organizations using WPFunnels Creator LMS should implement the following specific mitigations: 1) Immediately audit all access control configurations within the LMS to identify and correct any improperly assigned permissions or roles. 2) Restrict LMS administrative and sensitive functions to the minimum necessary users and enforce the principle of least privilege. 3) Monitor LMS logs for unusual access patterns or unauthorized attempts to access restricted areas. 4) Engage with the vendor or community to obtain patches or updates as soon as they become available and apply them promptly. 5) Consider implementing additional access control layers such as web application firewalls (WAFs) to detect and block unauthorized requests targeting the LMS. 6) Educate LMS administrators about secure configuration best practices and the risks of misconfigured access controls. 7) If possible, isolate the LMS environment within the network to limit exposure and reduce the attack surface. 8) Regularly back up LMS data and configurations to enable recovery in case of compromise. These steps go beyond generic advice by focusing on configuration audits, monitoring, and layered defenses tailored to the LMS environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-31T20:12:32.245Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695d3e3a326bcb029a44a08e

Added to database: 1/6/2026, 4:54:18 PM

Last enriched: 1/6/2026, 5:07:38 PM

Last updated: 1/8/2026, 2:27:24 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats