• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Computer security Intruders Latest Cybersecurity News Linux security Mac security Windows security

Vulnerabilities in WordPress LMS plugins will allow attackers to impersonate teachers

William Marshal Posted On April 30, 2020
13



Wordpress vulnerability in Learning Management System

Learning management system (LMS) plugins in WordPress are identified with several vulnerabilities that can be exploited to breach into the platform, steal test answers and alter the grades. With global pandemic, online education has become pivotal, facilitating teachers, students, trainers and other educational entities try to continue their routines as usual. 

Many educational websites own LifterLMS, LearnDash, and LearnPress, and are managed by the institutions. Around 100,000 websites are actively using this plugin to facilitate their online educational procedures. However, a few security researchers at Check Point have identified some pivotal vulnerabilities that could be exploited in the wild and have published a report today. In overall, the researchers have discovered four vulnerabilities that would allow hackers to steal personal information, alter payment models, modify grades, impersonate teachers, control tests, and finally even design and modify certificates. Vulnerabilities could be exploited using remote code execution without authentication, allowing a malicious actor to own the LMS platform.

More about the vulnerabilities

LearnPress 3.2.6.7 and earlier versions are vulnerable to a SQL injection (CVE-2020-6010), and this can be mitigated by effective SQL statements and user inputs of the same. The second vulnerable tracked as CVE-2020-6011, will allow attackers to impersonate the teacher by elevated privileges, which is possible using exploitation of the legacy code located within the solution. Furthermore, in lower versions of LearnDash, (below 3.1.6) the researchers identified a second order SQL injections and this could have been neglected with proper preparation of statements.

In LearnDash versions lower than 3.1.6, the researchers found an unauthenticated second-order SQL‌ injection (CVE-2020-6009) that is more difficult to exploit but could also have been prevented through prepared statements. Additionally, LifterLMS’s lower versions suffer from an arbitrary file write and this vulnerability is tracked as CVE-2020-6008. Versions below 3.37.15. The LifterLMS flaw could allow actors to execute remote codes on the server of the product. 

The below video shows how security researchers were able to exploit the flaws in the LMS plugins in WordPress.

Fixing the LMS vulnerabilities

Check Point researchers had already informed the LMS development team regarding the vulnerabilities and the developers have fixed the issues in the latest updates. So if you are using these plugins kindly update them to the latest versions to keep your system, teachers and students secured. It is unbelievable the hackers aren’t even letting go of the education sectors even during these crisis.

Education institutions need to build up their security over online platforms and ensure those applications are updated periodically to stay safe digitally during this crisis and still deliver their training and classes over online.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.  

Share the article with your friends


LMS vulnerabilitiesWordpress plugins vulnerability


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

13 Comments

porno
December 17, 2020 at 8:12 pm
Reply

In your ad for ek Muthi anaj the telephone #for Ashok sharma is wrong. .provide with the correct number. Teddi Sheridan Behka


ucretsiz
January 12, 2021 at 9:41 am
Reply

Some really prize blog posts on this website , saved to bookmarks . Juieta Fidel Outhe


filmkovasi
January 30, 2021 at 12:58 am
Reply

You made some good points there. I did a search on the topic and found most individuals will go along with with your site. Evelyn Nathanil Adkins


1080p
January 30, 2021 at 2:15 am
Reply

The most effective man is often the grooms most reliable and faithful good friend or relative. Delilah Fairfax Evadnee


123movies
January 31, 2021 at 11:04 pm
Reply

Just bookmarked your blog, it is a really nice and helpful piece of information. I am glad that you shared this helpful information with us. Please stay us informed like this. Keep writing. Vilhelmina Cad Dewain


hindi movie
February 1, 2021 at 5:04 am
Reply

Ahaa, its pleasant conversation concerning this piece of writing at this place at this weblog, I have read all that, so at this time me also commenting here. Rosana Broderick Rochella


online
February 4, 2021 at 12:27 pm
Reply

I think this is a real great blog article. Much thanks again. Cool. Nanine Kimble Benedikt


direk
February 4, 2021 at 10:51 pm
Reply

Pretty nice post. I just stumbled upon your blog and wished to say that I have really enjoyed browsing your blog posts. After all I will be subscribing to your rss feed and I hope you write again very soon! Elka Roderigo Merrily


hindi movie
February 6, 2021 at 9:07 am
Reply

Currently it looks like Movable Type is the best blogging platform available right now. Ruthe Mano Jarvey


movies
February 6, 2021 at 12:58 pm
Reply

Pretty! This was an extremely wonderful article. Many thanks for providing this information. Perla Corbie Borden


anime
February 7, 2021 at 2:43 am
Reply

Aw, this was a truly nice blog post. In idea I would like to place in writing similar to this in addition? taking some time as well as real initiative to make a great short article? however what can I say? I hesitate alot and by no means appear to get something done. Aura Rainer Hadlee


dublaj
February 7, 2021 at 8:25 am
Reply

Great post! Just found your site today. I really appreciate an in-depth and informational style of posting, here. Agnola Chickie Scheers


diziler
February 7, 2021 at 9:23 am
Reply

I enjoy what you guys tend to be up too. This type of clever work and exposure! Anselma Donalt Ho


Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Recast Software: Advanced Endpoint Management and Security...
      November 16, 2024
    • Patch My PC: Streamlined Software Management for ConfigMgr...
      November 9, 2024
    • Best Microsoft Intune Alternatives: Top 5 MDMs to Consider
      November 4, 2024
    • Top 11 Log Management Tools for Efficient System Management
      September 20, 2024
    • Top 5 Threat Intelligence Tools For 2024
      September 19, 2024


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search