Page 2 of 10 results (0.011 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 8

The MasterStudy LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.3.1. This is due to insufficient validation checks within the _register_user() function called by the 'wp_ajax_nopriv_stm_lms_register' AJAX action. This makes it possible for unauthenticated attackers to register a user with administrator-level privileges when MasterStudy LMS Pro is installed and the LMS Forms Editor add-on is enabled. El complemento MasterStudy LMS para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 3.3.1 incluida. Esto se debe a comprobaciones de validación insuficientes dentro de la función _register_user() llamada por la acción AJAX 'wp_ajax_nopriv_stm_lms_register'. • https://github.com/ASR511-OO7/CVE-2024-24095 https://github.com/ASR511-OO7/CVE-2024-24099 https://github.com/ASR511-OO7/CVE-2024-24098 https://github.com/ASR511-OO7/CVE-2024-24092 https://github.com/ASR511-OO7/CVE-2024-24096 https://github.com/ASR511-OO7/CVE-2024-24097 https://github.com/ASR511-OO7/CVE-2024-24093 https://github.com/ASR511-OO7/CVE-2024-24094 https://docs.stylemixthemes.com/masterstudy-lms/changelog-free-version#id-3.3.2 https://plugins.trac.w • CWE-266: Incorrect Privilege Assignment •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The MasterStudy LMS plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.0 via the 'modal' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. El complemento MasterStudy LMS para WordPress es vulnerable a Local File Inclusion (LFI) en todas las versiones hasta la 3.3.0 incluida a través del parámetro 'modal'. Esto hace posible que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, permitiendo la ejecución de cualquier código PHP en esos archivos. • https://docs.stylemixthemes.com/masterstudy-lms/changelog-free-version#id-3.3.1 https://plugins.trac.wordpress.org/changeset/3055398/masterstudy-lms-learning-management-system#file10 https://www.wordfence.com/threat-intel/vulnerabilities/id/d68a2b60-ee89-4231-b256-214eba418244?source=cve • CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The MasterStudy LMS plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the search_posts function in all versions up to, and including, 3.2.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to expose draft post titles and excerpts. El complemento MasterStudy LMS para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificación de capacidad en la función search_posts en todas las versiones hasta la 3.2.13 incluida. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, expongan borradores de títulos y extractos de publicaciones. • https://plugins.trac.wordpress.org/changeset/3050967/masterstudy-lms-learning-management-system https://www.wordfence.com/threat-intel/vulnerabilities/id/1be686d3-16b1-4ec7-b304-848ca4d7162c?source=cve • CWE-862: Missing Authorization •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 3.2.10. This can allow unauthenticated attackers to extract sensitive data including all registered user's username and email addresses which can be used to help perform future attacks. El complemento MasterStudy LMS WordPress Plugin – for Online Courses and Education para WordPress es vulnerable a la exposición de la información en versiones hasta la 3.2.10 incluida. Esto puede permitir a atacantes no autenticados extraer datos confidenciales, incluidos todos los nombres de usuario y direcciones de correo electrónico de todos los usuarios registrados, que pueden utilizarse para ayudar a realizar futuros ataques. • https://plugins.svn.wordpress.org/masterstudy-lms-learning-management-system/tags/3.2.8/_core/lms/classes/models/StmUser.php https://plugins.svn.wordpress.org/masterstudy-lms-learning-management-system/tags/3.2.8/_core/lms/route.php https://plugins.trac.wordpress.org/changeset/3045511/masterstudy-lms-learning-management-system/tags/3.2.11/_core/lms/route.php?old=3036794&old_path=masterstudy-lms-learning-management-system/trunk/_core/lms/route.php https://www.wordfence.com/threat-intel/vulnerabilitie • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. El complemento MasterStudy LMS WordPress Plugin – for Online Courses and Education para WordPress es vulnerable a la inyección SQL basada en unión a través del parámetro 'user' de la ruta REST /lms/stm-lms/order/items en todas las versiones hasta, e incluyendo, 3.2.5 debido a un escape insuficiente en el parámetro proporcionado por el usuario y a la falta de preparación suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer información confidencial de la base de datos. • https://github.com/rat-c/CVE-2024-1512 https://plugins.trac.wordpress.org/changeset/3036794/masterstudy-lms-learning-management-system/trunk/_core/lms/classes/models/StmStatistics.php https://www.wordfence.com/threat-intel/vulnerabilities/id/d6b6d824-51d3-4da9-a39a-b957368df4dc?source=cve • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •