Impact
This vulnerability arises from missing authorization checks within the DesignThemes LMS Addon plugin for WordPress. The plugin fails to enforce proper access control for certain administrative functions, allowing a user without sufficient privileges to gain full control over the plugin’s configuration and potentially other site resources. The weakness is identified as CWE-862, indicating broken access control. The consequence of exploitation is that an attacker could modify learning management settings, insert or delete content, or otherwise tamper with course data, thereby compromising data integrity, confidentiality, and availability for the affected site.
Affected Systems
The affected product is the DesignThemes LMS Addon WordPress plugin, version 2.6 and earlier. Any WordPress installation that has this plugin present and configured is vulnerable unless the plugin has been updated beyond the 2.6 release.
Risk and Exploitability
The CVSS score of 5.3 reflects moderate severity, and the EPSS score of less than 1% indicates a very low yet non-zero likelihood of exploitation at the time of analysis. This entry is not listed in the CISA KEV catalog. The vulnerability can be exploited by any authenticated user who can invoke the plugin’s administrative endpoints, so the likely attack vector is via web interfaces with limited privilege. While no public exploits are documented, the lack of enforcement of authorization checks makes the risk tangible pending user authorization.
OpenCVE Enrichment