Description
The LearnPress – WordPress LMS Plugin for WordPress is vulnerable to unauthorized file deletion in versions up to, and including, 4.3.2.2 via the /wp-json/lp/v1/material/{file_id} REST API endpoint. This is due to a parameter mismatch between the DELETE operation and authorization check, where the endpoint uses file_id from the URL path but the permission callback validates item_id from the request body. This makes it possible for authenticated attackers, with teacher-level access, to delete arbitrary lesson material files uploaded by other teachers via sending a DELETE request with their own item_id (to pass authorization) while targeting another teacher's file_id.
Problem types
CWE-639 Authorization Bypass Through User-Controlled Key
Product status
* (semver)
Timeline
| 2025-12-16: | Vendor Notified |
| 2026-01-06: | Disclosed |
Credits
Deniz Mert
References
www.wordfence.com/...-1ee1-4384-9fc2-29e2c9042426?source=cve
plugins.trac.wordpress.org/...p-rest-material-controller.php
plugins.trac.wordpress.org/...p-rest-material-controller.php
plugins.trac.wordpress.org/...p-rest-material-controller.php
plugins.trac.wordpress.org/...p-rest-material-controller.php