Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69359: Missing Authorization in WPFunnels Creator LMS

0
Medium
VulnerabilityCVE-2025-69359cvecve-2025-69359
Published: Tue Jan 06 2026 (01/06/2026, 16:36:41 UTC)
Source: CVE Database V5
Vendor/Project: WPFunnels
Product: Creator LMS

Description

Missing Authorization vulnerability in WPFunnels Creator LMS creatorlms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Creator LMS: from n/a through <= 1.1.12.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:04:07 UTC

Technical Analysis

CVE-2025-69359 is a Missing Authorization vulnerability identified in the WPFunnels Creator LMS product, affecting versions up to and including 1.1.12. The flaw arises from incorrectly configured access control security levels, allowing remote attackers to bypass authorization checks. Specifically, the vulnerability permits unauthenticated attackers to access certain resources or functionalities that should be restricted, leading to limited confidentiality breaches. The vulnerability has a CVSS 3.1 base score of 5.3, indicating medium severity, with an attack vector over the network, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to confidentiality as the vulnerability does not affect integrity or availability. No known exploits have been reported in the wild, and no patches or mitigations have been officially released at the time of publication. The vulnerability highlights a common security misconfiguration in web applications where access control enforcement is incomplete or missing, emphasizing the need for rigorous authorization checks in LMS platforms that manage sensitive educational data and user information.

Potential Impact

For European organizations, the impact of CVE-2025-69359 primarily concerns the confidentiality of sensitive educational data managed within the Creator LMS platform. Unauthorized access could expose user information, course content, or administrative data, potentially leading to privacy violations and compliance issues under regulations such as GDPR. Although the vulnerability does not allow modification or disruption of services, the leakage of confidential information can damage organizational reputation and trust. Educational institutions, training providers, and enterprises relying on Creator LMS for learning management are at risk. The medium severity rating suggests that while the threat is not critical, it warrants timely attention to prevent exploitation, especially in sectors with stringent data protection requirements. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Conduct a thorough review of access control policies within the Creator LMS deployment to ensure all sensitive endpoints enforce proper authorization checks. 2) Restrict access to administrative and sensitive resources using role-based access control (RBAC) and principle of least privilege. 3) Monitor logs for unusual or unauthorized access attempts to detect potential exploitation attempts early. 4) Engage with the vendor or security community to obtain patches or updates addressing this vulnerability as soon as they become available. 5) If patches are not yet released, consider temporary compensating controls such as network segmentation, IP whitelisting, or web application firewalls (WAF) to limit exposure. 6) Educate LMS administrators on secure configuration practices and regularly audit system settings to prevent similar misconfigurations. 7) Maintain an incident response plan tailored to data confidentiality breaches in LMS environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-31T20:12:32.245Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695d3e3a326bcb029a44a08e

Added to database: 1/6/2026, 4:54:18 PM

Last enriched: 1/21/2026, 2:04:07 AM

Last updated: 2/7/2026, 1:07:57 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats