CVE-2025-12099
The · The Academy LMS – WordPress LMS Plugin for Complete eLearning Solution
A high-severity vulnerability has been identified in the Academy LMS WordPress plugin, which could allow an attacker to take control of an affected website.
Executive summary
A high-severity vulnerability has been identified in the Academy LMS WordPress plugin, which could allow an attacker to take control of an affected website. This vulnerability, known as PHP Object Injection, can be exploited by an unauthenticated attacker to execute arbitrary code, potentially leading to a full site compromise, data theft, or service disruption. Organizations using this plugin must update it immediately to prevent exploitation.
Vulnerability
The vulnerability is a PHP Object Injection flaw. It exists because the plugin improperly handles user-supplied data that is passed to the unserialize() PHP function. An attacker can provide a specially crafted serialized string (a "malicious object") as input, which, when deserialized by the application, can trigger the execution of specific PHP methods within the application's code. This can lead to various malicious outcomes, including arbitrary code execution, file manipulation, or unauthorized database queries, effectively giving the attacker control over the WordPress site.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.2. Successful exploitation could have a significant negative impact on the business. Potential consequences include the theft of sensitive data such as student information, course content, and user credentials; website defacement causing reputational damage; and the installation of backdoors or malware, which could use the server to launch further attacks. For an organization running an eLearning platform, this could lead to a loss of customer trust, regulatory fines for data breaches, and significant financial costs for incident response and recovery.
Remediation
Immediate Action: Immediately update the "Academy LMS – WordPress LMS Plugin for Complete eLearning Solution" plugin to the latest available version, which contains a patch for this vulnerability. After updating, it is crucial to review the WordPress security settings to ensure they are configured correctly. If the plugin is no longer in use or required for business operations, it should be deactivated and completely removed to eliminate this attack vector.
Proactive Monitoring: Monitor web server access logs for suspicious POST or GET requests containing long, serialized PHP object strings (e.g., patterns like O:[...]). Implement file integrity monitoring to detect unauthorized changes to plugin files or the WordPress core. Monitor for the creation of new, unauthorized administrator accounts or unusual outbound network traffic originating from the web server.
Compensating Controls: If patching cannot be performed immediately, deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block PHP Object Injection attempts. Restrict access to the WordPress administrative dashboard to trusted IP addresses only. Regularly back up the website and database to facilitate recovery in the event of a compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity of this vulnerability, immediate action is strongly recommended. Organizations must prioritize updating the affected Academy LMS plugin to the latest version to mitigate the risk of a full website compromise. Although there is no evidence of active exploitation, the potential for a motivated attacker to develop an exploit is high. A defense-in-depth approach should be maintained by combining patching with proactive monitoring and the use of a Web Application Firewall to protect against this and other web-based threats.