Filtered by vendor Thimpress
Subscriptions
Filtered by product Learnpress
Subscriptions
Total
32 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-24951 | 1 Thimpress | 1 Learnpress | 2024-11-21 | 9.8 Critical |
The LearnPress WordPress plugin before 4.1.4 does not sanitise, validate and escape the id parameter before using it in SQL statements when duplicating course/lesson/quiz/question, leading to SQL Injections issues | ||||
CVE-2021-24702 | 1 Thimpress | 1 Learnpress | 2024-11-21 | 4.8 Medium |
The LearnPress WordPress plugin before 4.1.3.1 does not properly sanitize or escape various inputs within course settings, which could allow high privilege users to perform Cross-Site Scripting attacks when the unfiltred_html capability is disallowed | ||||
CVE-2020-7916 | 1 Thimpress | 1 Learnpress | 2024-11-21 | 6.5 Medium |
be_teacher in class-lp-admin-ajax.php in the LearnPress plugin 3.2.6.5 and earlier for WordPress allows any registered user to assign itself the teacher role via the wp-admin/admin-ajax.php?action=learnpress_be_teacher URI without any additional permission checks. Therefore, any user can change its role to an instructor/teacher and gain access to otherwise restricted data. | ||||
CVE-2020-6010 | 1 Thimpress | 1 Learnpress | 2024-11-21 | 8.8 High |
LearnPress Wordpress plugin version prior and including 3.2.6.7 is vulnerable to SQL Injection | ||||
CVE-2020-11511 | 1 Thimpress | 1 Learnpress | 2024-11-21 | 8.1 High |
The LearnPress plugin before 3.2.6.9 for WordPress allows remote attackers to escalate the privileges of any user to LP Instructor via the accept-to-be-teacher action parameter. | ||||
CVE-2018-16175 | 1 Thimpress | 1 Learnpress | 2024-11-21 | N/A |
SQL injection vulnerability in the LearnPress prior to version 3.1.0 allows attacker with administrator rights to execute arbitrary SQL commands via unspecified vectors. | ||||
CVE-2018-16174 | 1 Thimpress | 1 Learnpress | 2024-11-21 | N/A |
Open redirect vulnerability in LearnPress prior to version 3.1.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | ||||
CVE-2018-16173 | 1 Thimpress | 1 Learnpress | 2024-11-21 | N/A |
Cross-site scripting vulnerability in LearnPress prior to version 3.1.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||||
CVE-2024-39641 | 1 Thimpress | 1 Learnpress | 2024-09-18 | 4.3 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in ThimPress LearnPress.This issue affects LearnPress: from n/a through 4.2.6.8.2. | ||||
CVE-2024-8522 | 1 Thimpress | 1 Learnpress | 2024-09-13 | 10 Critical |
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_only_fields' parameter of the /wp-json/learnpress/v1/courses REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||||
CVE-2024-8529 | 1 Thimpress | 1 Learnpress | 2024-09-13 | 10 Critical |
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_fields' parameter of the /wp-json/lp/v1/courses/archive-course REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||||
CVE-2024-7548 | 1 Thimpress | 1 Learnpress | 2024-08-08 | 8.8 High |
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'order' parameter in all versions up to, and including, 4.2.6.9.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |