7 results (0.005 seconds)

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 0

The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on several functions in versions up to, and including, 3.3.8. This makes it possible for authenticated attackers, with subscriber level permissions and above, to read and modify content such as course questions, post titles, and taxonomies. El complemento MasterStudy LMS WordPress Plugin – for Online Courses and Education para WordPress es vulnerable al acceso no autorizado, modificación y pérdida de datos debido a una falta de verificación de capacidad en varias funciones en versiones hasta la 3.3.8 incluida. Esto hace posible que atacantes autenticados, con permisos de nivel de suscriptor y superior, lean y modifiquen contenido como preguntas de cursos, títulos de publicaciones y taxonomías. • https://plugins.trac.wordpress.org/changeset/3078394 https://www.wordfence.com/threat-intel/vulnerabilities/id/64eb3d67-7056-4a03-ba3b-a04c2e96648d?source=cve • CWE-862: Missing Authorization •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The MasterStudy LMS plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.3 via the 'template' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. El complemento MasterStudy LMS para WordPress es vulnerable a la inclusión de archivos locales en todas las versiones hasta la 3.3.3 incluida a través del parámetro 'plantilla'. Esto hace posible que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, permitiendo la ejecución de cualquier código PHP en esos archivos. • https://plugins.trac.wordpress.org/changeset/3064337/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/helpers.php https://plugins.trac.wordpress.org/changeset/3064337/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/templates.php https://www.wordfence.com/threat-intel/vulnerabilities/id/9a573740-cdfe-4b58-b33b-5e50bcbc4779?source=cve • CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 8

The MasterStudy LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.3.1. This is due to insufficient validation checks within the _register_user() function called by the 'wp_ajax_nopriv_stm_lms_register' AJAX action. This makes it possible for unauthenticated attackers to register a user with administrator-level privileges when MasterStudy LMS Pro is installed and the LMS Forms Editor add-on is enabled. El complemento MasterStudy LMS para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 3.3.1 incluida. Esto se debe a comprobaciones de validación insuficientes dentro de la función _register_user() llamada por la acción AJAX 'wp_ajax_nopriv_stm_lms_register'. • https://github.com/ASR511-OO7/CVE-2024-24095 https://github.com/ASR511-OO7/CVE-2024-24099 https://github.com/ASR511-OO7/CVE-2024-24098 https://github.com/ASR511-OO7/CVE-2024-24092 https://github.com/ASR511-OO7/CVE-2024-24096 https://github.com/ASR511-OO7/CVE-2024-24097 https://github.com/ASR511-OO7/CVE-2024-24093 https://github.com/ASR511-OO7/CVE-2024-24094 https://docs.stylemixthemes.com/masterstudy-lms/changelog-free-version#id-3.3.2 https://plugins.trac.w • CWE-266: Incorrect Privilege Assignment •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The MasterStudy LMS plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.0 via the 'modal' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. El complemento MasterStudy LMS para WordPress es vulnerable a Local File Inclusion (LFI) en todas las versiones hasta la 3.3.0 incluida a través del parámetro 'modal'. Esto hace posible que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, permitiendo la ejecución de cualquier código PHP en esos archivos. • https://docs.stylemixthemes.com/masterstudy-lms/changelog-free-version#id-3.3.1 https://plugins.trac.wordpress.org/changeset/3055398/masterstudy-lms-learning-management-system#file10 https://www.wordfence.com/threat-intel/vulnerabilities/id/d68a2b60-ee89-4231-b256-214eba418244?source=cve • CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The MasterStudy LMS plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the search_posts function in all versions up to, and including, 3.2.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to expose draft post titles and excerpts. El complemento MasterStudy LMS para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificación de capacidad en la función search_posts en todas las versiones hasta la 3.2.13 incluida. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, expongan borradores de títulos y extractos de publicaciones. • https://plugins.trac.wordpress.org/changeset/3050967/masterstudy-lms-learning-management-system https://www.wordfence.com/threat-intel/vulnerabilities/id/1be686d3-16b1-4ec7-b304-848ca4d7162c?source=cve • CWE-862: Missing Authorization •