Home

Description

The LearnPress – WordPress LMS Plugin for Create and Sell Online Courses plugin for WordPress is vulnerable to payment bypass through user-controlled key in all versions up to, and including, 4.3.5. This is due to improper handling of user-supplied request parameters in the REST API endpoint, which passes the unsanitized parameter array to the add_to_cart() function where array_merge() allows attacker-controlled values to overwrite hardcoded defaults. This makes it possible for authenticated attackers, with subscriber-level access and above, to enroll in any paid course entirely free of charge by supplying a quantity value of zero, which causes the order total to calculate as $0 and bypasses all payment gateway requirements.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-14 | Updated 2026-05-14 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version
affected

Timeline

2026-05-01:Vendor Notified
2026-05-13:Disclosed

Credits

winrace finder

References

www.wordfence.com/...-20d3-4b46-8637-fc1de586e19a?source=cve

plugins.trac.wordpress.org/...unk/inc/cart/class-lp-cart.php

plugins.trac.wordpress.org/...3.3/inc/cart/class-lp-cart.php

plugins.trac.wordpress.org/...lp-rest-courses-controller.php

plugins.trac.wordpress.org/...lp-rest-courses-controller.php

plugins.trac.wordpress.org/...unk/inc/cart/class-lp-cart.php

plugins.trac.wordpress.org/...3.3/inc/cart/class-lp-cart.php

plugins.trac.wordpress.org/...arnpress&sfp_email=&sfph_mail=

cve.org (CVE-2026-7648)

nvd.nist.gov (CVE-2026-7648)

Download JSON