Home

Description

The LearnPress – WordPress LMS Plugin for WordPress is vulnerable to unauthorized file deletion in versions up to, and including, 4.3.2.2 via the /wp-json/lp/v1/material/{file_id} REST API endpoint. This is due to a parameter mismatch between the DELETE operation and authorization check, where the endpoint uses file_id from the URL path but the permission callback validates item_id from the request body. This makes it possible for authenticated attackers, with teacher-level access, to delete arbitrary lesson material files uploaded by other teachers via sending a DELETE request with their own item_id (to pass authorization) while targeting another teacher's file_id.

PUBLISHED Reserved 2025-12-16 | Published 2026-01-07 | Updated 2026-01-07 | Assigner Wordfence




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-16:Vendor Notified
2026-01-06:Disclosed

Credits

Deniz Mert finder

References

www.wordfence.com/...-1ee1-4384-9fc2-29e2c9042426?source=cve

plugins.trac.wordpress.org/...p-rest-material-controller.php

plugins.trac.wordpress.org/...p-rest-material-controller.php

plugins.trac.wordpress.org/...p-rest-material-controller.php

plugins.trac.wordpress.org/...p-rest-material-controller.php

cve.org (CVE-2025-14802)

nvd.nist.gov (CVE-2025-14802)

Download JSON