Description
The LearnDash LMS plugin for WordPress is vulnerable to blind time-based SQL Injection via the 'filters[orderby_order]' parameter in the 'learndash_propanel_template' AJAX action in all versions up to, and including, 5.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-03-24
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Blind time-based SQL Injection enabling data exfiltration
Action: Apply Patch
AI Analysis

Impact

The LearnDash LMS plugin for WordPress contains a blind time‑based SQL injection flaw in the 'learndash_propanel_template' AJAX action. The vulnerability is triggered through the 'filters[orderby_order]' parameter, which does not undergo proper escaping or SQL preparation. By injecting specially crafted SQL, a malicious actor can append additional queries to the original statement, potentially leaking sensitive information from the database. This flaw only affects users who can authenticate with at least Contributor‑level permissions.

Affected Systems

Affected systems include all installations of StellarWP's LearnDash LMS plugin for WordPress with version numbers up to and including 5.0.3. No specific sub‑version details are listed beyond that threshold, so any site deploying LearnDash 5.0.3 or earlier remains vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 6.5, indicating moderate severity, and it is not listed in the CISA Known Exploited Vulnerabilities catalog. The EPSS score is not provided, but the requirement for authenticated users limits the scope of exploitation to site administrators who have granted Contributor or higher access. Nonetheless, once authenticated, an attacker can use the time‑based blind injection to gather data; the lack of a public exploit suggests exploitation may still require manual effort. Administrators should treat this as a moderate to high risk due to potential data exposure.

Generated by OpenCVE AI on March 24, 2026 at 03:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest LearnDash LMS version (greater than 5.0.3) to patch the vulnerable code
  • If an immediate upgrade is not possible, restrict Contributor‑level access or remove the vulnerable AJAX endpoint until a patch is applied
  • Audit your WordPress installation for unauthorized or unexpected database activity and review logs for signs of injection attempts
  • Maintain regular backups of both the database and the website files to ensure quick restoration if data integrity is compromised
  • Keep all WordPress plugins, themes, and core up to date to reduce the overall attack surface

Generated by OpenCVE AI on March 24, 2026 at 03:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Stellarwp
Stellarwp learndash Lms
Wordpress
Wordpress wordpress
Vendors & Products Stellarwp
Stellarwp learndash Lms
Wordpress
Wordpress wordpress

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description The LearnDash LMS plugin for WordPress is vulnerable to blind time-based SQL Injection via the 'filters[orderby_order]' parameter in the 'learndash_propanel_template' AJAX action in all versions up to, and including, 5.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title LearnDash LMS <= 5.0.3 - Authenticated (Contributor+) SQL Injection via 'filters[orderby_order]' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Stellarwp Learndash Lms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:20.936Z

Reserved: 2026-02-23T21:17:19.700Z

Link: CVE-2026-3079

cve-icon Vulnrichment

Updated: 2026-03-24T13:55:56.669Z

cve-icon NVD

Status : Deferred

Published: 2026-03-24T02:16:05.633

Modified: 2026-04-24T16:32:53.997

Link: CVE-2026-3079

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:32Z

Weaknesses