Computer security

Vulnerabilities in WordPress LMS plugins will allow attackers to impersonate teachers

Learning management system (LMS) plugins in WordPress are identified with several vulnerabilities that can be exploited to breach into the platform, steal test answers and alter the grades. With global pandemic, online education has become pivotal, facilitating teachers, students, trainers and other educational entities try to continue their routines as usual. 

Many educational websites own LifterLMSLearnDash, and LearnPress, and are managed by the institutions. Around 100,000 websites are actively using this plugin to facilitate their online educational procedures. However, a few security researchers at Check Point have identified some pivotal vulnerabilities that could be exploited in the wild and have published a report today. In overall, the researchers have discovered four vulnerabilities that would allow hackers to steal personal information, alter payment models, modify grades, impersonate teachers, control tests, and finally even design and modify certificates. Vulnerabilities could be exploited using remote code execution without authentication, allowing a malicious actor to own the LMS platform.

More about the vulnerabilities

LearnPress 3.2.6.7 and earlier versions are vulnerable to a SQL injection (CVE-2020-6010), and this can be mitigated by effective SQL statements and user inputs of the same. The second vulnerable tracked as CVE-2020-6011, will allow attackers to impersonate the teacher by elevated privileges, which is possible using exploitation of the legacy code located within the solution. Furthermore, in lower versions of LearnDash, (below 3.1.6) the researchers identified a second order SQL injections and this could have been neglected with proper preparation of statements.

In LearnDash versions lower than 3.1.6, the researchers found an unauthenticated second-order SQL‌ injection (CVE-2020-6009) that is more difficult to exploit but could also have been prevented through prepared statements. Additionally, LifterLMS’s lower versions suffer from an arbitrary file write and this vulnerability is tracked as CVE-2020-6008. Versions below 3.37.15. The LifterLMS flaw could allow actors to execute remote codes on the server of the product. 

The below video shows how security researchers were able to exploit the flaws in the LMS plugins in WordPress.

Fixing the LMS vulnerabilities

Check Point researchers had already informed the LMS development team regarding the vulnerabilities and the developers have fixed the issues in the latest updates. So if you are using these plugins kindly update them to the latest versions to keep your system, teachers and students secured. It is unbelievable the hackers aren’t even letting go of the education sectors even during these crisis.

Education institutions need to build up their security over online platforms and ensure those applications are updated periodically to stay safe digitally during this crisis and still deliver their training and classes over online.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit.  

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

View Comments

  • In your ad for ek Muthi anaj the telephone #for Ashok sharma is wrong. .provide with the correct number. Teddi Sheridan Behka

  • You made some good points there. I did a search on the topic and found most individuals will go along with with your site. Evelyn Nathanil Adkins

  • The most effective man is often the grooms most reliable and faithful good friend or relative. Delilah Fairfax Evadnee

  • Just bookmarked your blog, it is a really nice and helpful piece of information. I am glad that you shared this helpful information with us. Please stay us informed like this. Keep writing. Vilhelmina Cad Dewain

  • Ahaa, its pleasant conversation concerning this piece of writing at this place at this weblog, I have read all that, so at this time me also commenting here. Rosana Broderick Rochella

  • Pretty nice post. I just stumbled upon your blog and wished to say that I have really enjoyed browsing your blog posts. After all I will be subscribing to your rss feed and I hope you write again very soon! Elka Roderigo Merrily

  • Currently it looks like Movable Type is the best blogging platform available right now. Ruthe Mano Jarvey

  • Pretty! This was an extremely wonderful article. Many thanks for providing this information. Perla Corbie Borden

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago