CVE-2025-11923

WordPress · WordPress LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes plugin

A high-severity vulnerability has been identified in the LifterLMS WordPress plugin, which could allow a low-privileged attacker to gain administrative control over an affected website.

Executive summary

A high-severity vulnerability has been identified in the LifterLMS WordPress plugin, which could allow a low-privileged attacker to gain administrative control over an affected website. Successful exploitation could lead to complete system compromise, including data theft, website defacement, and further attacks launched from the compromised server. Organizations are urged to apply the available security update immediately to mitigate this significant risk.

Vulnerability

The vulnerability is a privilege escalation flaw within the LifterLMS plugin. A remote attacker with a low-level user account, such as a 'subscriber' or 'student', can exploit an authorization bypass in one of the plugin's functions. By sending a specially crafted request to the vulnerable function, the attacker can modify their user role, granting themselves administrative privileges without proper validation, leading to a full takeover of the WordPress site.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker full administrative control over the affected website, posing a significant risk to the organization. Potential consequences include the theft of sensitive user data (including PII of students and instructors), unauthorized modification or deletion of course content, website defacement causing reputational damage, and the installation of backdoors or malware to use the server for further malicious activities. For businesses relying on the eLearning platform for revenue, this could result in operational disruption and financial loss.

Remediation

Immediate Action:

  • Immediately update the LifterLMS plugin to the latest patched version provided by the vendor.
  • After patching, conduct a thorough audit of all user accounts, especially those with administrative privileges, to identify and remove any unauthorized or suspicious accounts.
  • Review all installed WordPress plugins and themes; remove any that are deactivated or no longer needed to reduce the overall attack surface.

Proactive Monitoring:

  • Monitor web server and application logs for suspicious activity, such as unusual POST requests to plugin-specific endpoints or logs showing unexpected user role changes.
  • Implement a file integrity monitoring solution to detect unauthorized changes to plugin files or the WordPress core.
  • Monitor for the creation of new administrative accounts outside of normal operational procedures.

Compensating Controls:

  • If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically tailored to block exploitation attempts against this vulnerability.
  • Restrict access to the WordPress administrative dashboard (/wp-admin/) to only trusted IP addresses.
  • Enforce the principle of least privilege for all user accounts and temporarily disable new user registration if the feature is not critical to operations.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the high severity (CVSS 8.8) of this privilege escalation vulnerability, immediate remediation is strongly recommended. All organizations using the LifterLMS WordPress plugin must prioritize applying the security update to prevent a potential site takeover. Although this CVE is not currently on the CISA KEV list, its critical impact makes it a prime target for future exploitation. After patching, a security audit of user accounts and site files should be performed to ensure the integrity of the system has not been compromised.