Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3226: CWE-862 Missing Authorization in thimpress LearnPress – WordPress LMS Plugin for Create and Sell Online Courses

0
Medium
VulnerabilityCVE-2026-3226cvecve-2026-3226cwe-862
Published: Thu Mar 12 2026 (03/12/2026, 02:22:37 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: LearnPress – WordPress LMS Plugin for Create and Sell Online Courses

Description

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized email notification triggering due to missing capability checks on all 10 functions in the SendEmailAjax class in all versions up to, and including, 4.3.2.8. The AbstractAjax::catch_lp_ajax() dispatcher verifies a wp_rest nonce but performs no current_user_can() check before dispatching to handler functions. The wp_rest nonce is embedded in the frontend JavaScript for all authenticated users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger arbitrary email notifications to admins, instructors, and users, enabling email flooding, social engineering, and impersonation of admin decisions regarding instructor requests.

AI-Powered Analysis

AILast updated: 03/12/2026, 03:15:11 UTC

Technical Analysis

CVE-2026-3226 is a missing authorization vulnerability (CWE-862) in the LearnPress – WordPress LMS Plugin, widely used for creating and selling online courses. The vulnerability exists because the plugin's SendEmailAjax class functions lack proper capability checks (current_user_can()) before executing email notification actions. Although the AbstractAjax::catch_lp_ajax() dispatcher verifies a wp_rest nonce embedded in frontend JavaScript, this nonce is accessible to all authenticated users, including those with minimal privileges such as Subscribers. Consequently, any authenticated user can invoke these functions to send arbitrary email notifications to administrators, instructors, and other users. This can lead to email flooding, social engineering attacks, and impersonation of administrative decisions related to instructor requests. The vulnerability affects all plugin versions up to 4.3.2.8. The CVSS 3.1 base score is 4.3 (medium), reflecting the low complexity of exploitation (low attack complexity), requirement for authenticated access with low privileges, and impact limited to integrity (unauthorized email sending) without affecting confidentiality or availability. No patches are currently linked, and no known exploits have been reported in the wild. The flaw stems from a design oversight in authorization logic, where nonce verification is mistaken for an authorization check, allowing privilege escalation within the plugin's email notification system.

Potential Impact

The primary impact of this vulnerability is on the integrity of communications within affected WordPress sites using the LearnPress plugin. Attackers with Subscriber-level access can send unauthorized emails impersonating administrators or instructors, potentially misleading users and staff. This can facilitate social engineering attacks, phishing, or manipulation of course-related decisions. Email flooding could disrupt normal communication channels, causing operational inefficiencies and user distrust. While confidentiality and availability are not directly compromised, the reputational damage and potential for further exploitation via social engineering are significant. Organizations relying on LearnPress for e-learning may face increased risk of targeted attacks against their users and staff. The vulnerability could also be leveraged as a stepping stone for broader attacks if combined with other weaknesses. Given the widespread use of WordPress and LearnPress, the scope of affected systems is considerable, especially in education and training sectors.

Mitigation Recommendations

Immediate mitigation should focus on restricting user roles and capabilities to minimize the number of users with authenticated access, especially limiting Subscriber-level users where possible. Administrators should monitor outgoing email logs for unusual activity indicative of abuse. Since no official patch is currently linked, site owners should consider applying custom authorization checks by modifying the plugin code to include current_user_can() checks before email functions are executed. Alternatively, temporarily disabling the email notification features or the plugin itself until a patch is released can reduce risk. Employing Web Application Firewalls (WAF) with rules to detect and block suspicious AJAX requests related to SendEmailAjax functions can help mitigate exploitation attempts. Regularly updating WordPress core and plugins, and subscribing to vendor advisories for patch releases, is critical. Educating users about phishing and social engineering risks related to this vulnerability is also recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-25T20:01:19.815Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b22c262f860ef943edb6e1

Added to database: 3/12/2026, 2:59:50 AM

Last enriched: 3/12/2026, 3:15:11 AM

Last updated: 3/14/2026, 3:19:08 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses