Description
WP Learn Manager 1.1.2 contains a stored cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts through the fieldtitle parameter. Attackers can submit POST requests to the jslm_fieldordering page with XSS payloads in the fieldtitle field to execute arbitrary JavaScript when administrators view the field ordering interface.
Published: 2026-05-16
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

WP Learn Manager 1.1.2 includes a stored cross‑site scripting weakness that allows an unauthenticated attacker to inject arbitrary JavaScript via the fieldtitle parameter. By sending a crafted POST request to the jslm_fieldordering endpoint, an attacker can place malicious payloads that are executed when an administrator subsequently opens the field ordering interface. Because the payload runs in the admin’s browser context, it could steal administrative credentials, hijack sessions, or perform further malicious actions on the site.

Affected Systems

Vulnerabilities are present only in the WordPress plugin WP Learn Manager, version 1.1.2. Based on the vendor's documentation, it is inferred that earlier releases (1.0.0 to 1.1.1) and later releases (1.1.3 and above) are not affected. Therefore, sites running the exact 1.1.2 build are at risk.

Risk and Exploitability

The flaw carries a CVSS score of 5.1, indicating moderate severity, and no EPSS data is currently available. The exploitation path is remote and requires no authentication, which increases the risk of exploitation by a wide range of attackers. Because the vulnerability is not listed in CISA’s KEV catalog, no known widespread exploitation campaigns have been reported, but the attack vector remains straightforward: unauthenticated POST to the ordering page followed by an admin’s visit to the interface triggers client‑side script execution.

Generated by OpenCVE AI on May 16, 2026 at 16:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WP Learn Manager plugin to a non‑vulnerable version (e.g., 1.1.3 or newer).
  • If an immediate upgrade is not feasible, block unauthenticated access to the jslm_fieldordering endpoint by using server‑side access controls or a local WordPress filter that allows only logged‑in administrators to post to that URL.
  • Ensure that any custom input in the plugin, especially fieldtitle, is validated and escaped before rendering to prevent future XSS.

Generated by OpenCVE AI on May 16, 2026 at 16:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 16 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description WP Learn Manager 1.1.2 contains a stored cross-site scripting vulnerability that allows unauthenticated attackers to inject malicious scripts through the fieldtitle parameter. Attackers can submit POST requests to the jslm_fieldordering page with XSS payloads in the fieldtitle field to execute arbitrary JavaScript when administrators view the field ordering interface.
Title WordPress Plugin WP Learn Manager 1.1.2 Stored XSS
First Time appeared Wplearnmanager
Wplearnmanager wp Learn Manager
Weaknesses CWE-79
CPEs cpe:2.3:a:wplearnmanager:wp_learn_manager:1.0.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.0.2:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.0.3:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.0.4:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.0.5:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.0.6:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.0.7:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.0.8:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.0.9:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.1.0:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.1.1:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.1.2:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.1.3:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.1.4:*:*:*:*:wordpress:*:*
cpe:2.3:a:wplearnmanager:wp_learn_manager:1.1.5:*:*:*:*:wordpress:*:*
Vendors & Products Wplearnmanager
Wplearnmanager wp Learn Manager
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Wordpress Wordpress
Wplearnmanager Wp Learn Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-16T15:26:15.528Z

Reserved: 2026-05-16T14:36:27.726Z

Link: CVE-2021-47975

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-16T16:16:22.973

Modified: 2026-05-16T16:16:22.973

Link: CVE-2021-47975

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T17:15:26Z

Weaknesses