CVE-2026-1787: CWE-862 Missing Authorization in thimpress LearnPress – Backup & Migration Tool
CVE-2026-1787 is a medium severity vulnerability in the LearnPress Export Import WordPress extension, specifically in the Backup & Migration Tool by thimpress. The flaw arises from a missing authorization check in the 'delete_migrated_data' function, allowing unauthenticated attackers to delete migrated courses from Tutor LMS if it is installed and activated. Exploitation requires no user interaction but has a high attack complexity due to the prerequisite of Tutor LMS presence. The vulnerability impacts all versions up to 4. 1. 0 of the plugin. While no known exploits are currently in the wild, the vulnerability could lead to unauthorized data loss affecting course content integrity and availability. Organizations using LearnPress with Tutor LMS should prioritize patching or applying mitigations to prevent potential data deletion attacks. Countries with significant WordPress and e-learning platform usage, especially those with large educational institutions relying on these plugins, are at higher risk.
AI Analysis
Technical Summary
CVE-2026-1787 is a vulnerability classified under CWE-862 (Missing Authorization) found in the LearnPress Export Import extension for WordPress, specifically in the Backup & Migration Tool developed by thimpress. The vulnerability exists because the 'delete_migrated_data' function lacks proper capability checks, meaning it does not verify whether the requestor has the necessary permissions to delete migrated course data. This flaw affects all versions up to and including 4.1.0. The exploit scenario requires that the Tutor LMS plugin is installed and activated, as the vulnerability targets courses migrated from Tutor LMS. An unauthenticated attacker can send crafted requests to delete these migrated courses without any user interaction or authentication. The CVSS v3.1 score is 4.8 (medium severity), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and low availability impact. Although no public exploits are known, the vulnerability could lead to unauthorized deletion of course data, impacting the integrity and availability of educational content hosted on affected WordPress sites. The absence of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate attention from site administrators.
Potential Impact
The primary impact of CVE-2026-1787 is unauthorized deletion of migrated course data from Tutor LMS within WordPress sites using the vulnerable LearnPress Export Import extension. This can lead to loss of critical educational content, disrupting e-learning services and causing operational downtime for educational institutions and businesses relying on these platforms. The integrity of course data is compromised, and availability is reduced due to potential data loss. Although confidentiality is not impacted, the deletion of course content can result in significant reputational damage and loss of trust from users and students. The requirement for Tutor LMS to be installed limits the scope but still affects a substantial subset of LearnPress users. The medium CVSS score reflects the moderate risk, but the ease of exploitation without authentication and user interaction increases the urgency for mitigation. Organizations with large-scale e-learning deployments are particularly vulnerable to disruption and potential financial losses due to recovery efforts.
Mitigation Recommendations
1. Immediate mitigation involves disabling or uninstalling the LearnPress Export Import extension until a security patch is released. 2. Monitor WordPress plugin updates from thimpress and apply patches promptly once available. 3. Restrict access to the WordPress REST API and admin endpoints using web application firewalls (WAFs) or IP whitelisting to reduce exposure to unauthenticated requests. 4. Implement strict capability checks and role-based access controls within WordPress to limit who can perform migration-related actions. 5. Regularly back up all course data and site content to enable recovery in case of data deletion. 6. Conduct security audits and penetration testing focusing on plugin vulnerabilities and authorization checks. 7. Educate site administrators about the risks of installing multiple LMS plugins and the importance of maintaining updated software. 8. Consider isolating LMS environments or using containerization to limit the blast radius of potential exploits. These steps go beyond generic advice by focusing on access control hardening, proactive monitoring, and operational preparedness specific to WordPress LMS plugins.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Japan, Netherlands, Spain
CVE-2026-1787: CWE-862 Missing Authorization in thimpress LearnPress – Backup & Migration Tool
Description
CVE-2026-1787 is a medium severity vulnerability in the LearnPress Export Import WordPress extension, specifically in the Backup & Migration Tool by thimpress. The flaw arises from a missing authorization check in the 'delete_migrated_data' function, allowing unauthenticated attackers to delete migrated courses from Tutor LMS if it is installed and activated. Exploitation requires no user interaction but has a high attack complexity due to the prerequisite of Tutor LMS presence. The vulnerability impacts all versions up to 4. 1. 0 of the plugin. While no known exploits are currently in the wild, the vulnerability could lead to unauthorized data loss affecting course content integrity and availability. Organizations using LearnPress with Tutor LMS should prioritize patching or applying mitigations to prevent potential data deletion attacks. Countries with significant WordPress and e-learning platform usage, especially those with large educational institutions relying on these plugins, are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-1787 is a vulnerability classified under CWE-862 (Missing Authorization) found in the LearnPress Export Import extension for WordPress, specifically in the Backup & Migration Tool developed by thimpress. The vulnerability exists because the 'delete_migrated_data' function lacks proper capability checks, meaning it does not verify whether the requestor has the necessary permissions to delete migrated course data. This flaw affects all versions up to and including 4.1.0. The exploit scenario requires that the Tutor LMS plugin is installed and activated, as the vulnerability targets courses migrated from Tutor LMS. An unauthenticated attacker can send crafted requests to delete these migrated courses without any user interaction or authentication. The CVSS v3.1 score is 4.8 (medium severity), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and low availability impact. Although no public exploits are known, the vulnerability could lead to unauthorized deletion of course data, impacting the integrity and availability of educational content hosted on affected WordPress sites. The absence of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate attention from site administrators.
Potential Impact
The primary impact of CVE-2026-1787 is unauthorized deletion of migrated course data from Tutor LMS within WordPress sites using the vulnerable LearnPress Export Import extension. This can lead to loss of critical educational content, disrupting e-learning services and causing operational downtime for educational institutions and businesses relying on these platforms. The integrity of course data is compromised, and availability is reduced due to potential data loss. Although confidentiality is not impacted, the deletion of course content can result in significant reputational damage and loss of trust from users and students. The requirement for Tutor LMS to be installed limits the scope but still affects a substantial subset of LearnPress users. The medium CVSS score reflects the moderate risk, but the ease of exploitation without authentication and user interaction increases the urgency for mitigation. Organizations with large-scale e-learning deployments are particularly vulnerable to disruption and potential financial losses due to recovery efforts.
Mitigation Recommendations
1. Immediate mitigation involves disabling or uninstalling the LearnPress Export Import extension until a security patch is released. 2. Monitor WordPress plugin updates from thimpress and apply patches promptly once available. 3. Restrict access to the WordPress REST API and admin endpoints using web application firewalls (WAFs) or IP whitelisting to reduce exposure to unauthenticated requests. 4. Implement strict capability checks and role-based access controls within WordPress to limit who can perform migration-related actions. 5. Regularly back up all course data and site content to enable recovery in case of data deletion. 6. Conduct security audits and penetration testing focusing on plugin vulnerabilities and authorization checks. 7. Educate site administrators about the risks of installing multiple LMS plugins and the importance of maintaining updated software. 8. Consider isolating LMS environments or using containerization to limit the blast radius of potential exploits. These steps go beyond generic advice by focusing on access control hardening, proactive monitoring, and operational preparedness specific to WordPress LMS plugins.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-03T01:03:46.808Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69998d30be58cf853b7cb605
Added to database: 2/21/2026, 10:47:12 AM
Last enriched: 2/21/2026, 11:01:30 AM
Last updated: 2/21/2026, 11:48:18 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27579: CWE-346: Origin Validation Error in karnop realtime-collaboration-platform
HighCVE-2026-27492: CWE-488: Exposure of Data Element to Wrong Session in lettermint lettermint-node
MediumCVE-2026-27482: CWE-396: Declaration of Catch for Generic Exception in ray-project ray
MediumCVE-2025-14339: CWE-862 Missing Authorization in wedevs weMail: Email Marketing, Email Automation, Newsletters, Subscribers & eCommerce Email Optins
MediumCVE-2026-27479: CWE-918: Server-Side Request Forgery (SSRF) in ellite Wallos
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.