CVE-2022-47132

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in Academy LMS allows attackers to add unauthorized administrator accounts by tricking authenticated administrators into clicking malicious links. All Academy LMS instances running versions before 5.10 are affected, potentially giving attackers full administrative control over the learning management system.

💻 Affected Systems

Products:
  • Academy LMS
Versions: All versions before 5.10
Operating Systems: Any OS running Academy LMS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Academy LMS instance with attackers gaining administrative privileges, allowing them to modify courses, access sensitive student data, install backdoors, or delete the entire system.

🟠

Likely Case

Attackers create hidden administrator accounts to maintain persistent access, potentially leading to data theft, system manipulation, or further exploitation of the compromised platform.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation attempts fail, maintaining system integrity and preventing unauthorized administrative access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link or visiting a compromised website while logged into Academy LMS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.10 and later

Vendor Advisory: https://xpsec.co/blog/academy-lms-5-10-add-admin-csrf

Restart Required: No

Instructions:

1. Backup your Academy LMS database and files. 2. Download Academy LMS version 5.10 or later from the official source. 3. Replace all files with the new version while preserving configuration files. 4. Run any database update scripts if provided. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

CSRF Token Implementation

all

Manually add CSRF tokens to all administrative forms and validate them server-side

SameSite Cookie Attribute

all

Configure session cookies with SameSite=Strict attribute to prevent CSRF attacks

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Require re-authentication for all administrative actions and implement multi-factor authentication

🔍 How to Verify

Check if Vulnerable:

Check Academy LMS version in admin panel or by examining the software files. If version is below 5.10, the system is vulnerable.

Check Version:

Check admin dashboard or examine version.php file in Academy LMS installation directory

Verify Fix Applied:

After updating to 5.10 or later, test administrative functions to ensure CSRF tokens are present and validated. Attempt to reproduce the exploit using the published PoC to confirm it fails.

📡 Detection & Monitoring

Log Indicators:

  • Multiple administrator account creation attempts from same IP
  • Administrative actions without corresponding user session activity
  • POST requests to user creation endpoints without CSRF tokens

Network Indicators:

  • HTTP POST requests to /admin/user/create or similar endpoints without Referer headers or CSRF tokens
  • Unusual traffic patterns where administrative actions follow visits to external sites

SIEM Query:

source="academy_lms_logs" AND (event="user_created" OR event="admin_added") AND NOT csrf_token=*

🔗 References

📤 Share & Export