CVE-2024-33939

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to access course progress data in Masteriyo LMS WordPress plugin without proper authentication. It affects all WordPress sites running Masteriyo LMS plugin versions up to and including 1.7.3. Attackers can view user course progress information they shouldn't have access to.

💻 Affected Systems

Products:
  • Masteriyo - LMS WordPress Plugin
Versions: n/a through 1.7.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive course progress data for all users, potentially exposing learning patterns, completion status, and user activity across all courses.

🟠

Likely Case

Unauthenticated users accessing course progress information for various users, potentially exposing learning progress and completion data.

🟢

If Mitigated

Limited exposure of non-sensitive course metadata or partial progress information if proper access controls are partially implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are often easy to exploit once discovered. The vulnerability allows unauthenticated access, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.4 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/learning-management-system/vulnerability/wordpress-lms-by-masteriyo-plugin-1-7-3-broken-authentication-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Masteriyo - LMS'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.7.4+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the Masteriyo LMS plugin until patched

wp plugin deactivate masteriyo-lms

Access Restriction via .htaccess

linux

Restrict access to Masteriyo plugin directories

Add 'Deny from all' to .htaccess in /wp-content/plugins/masteriyo-lms/

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access to Masteriyo API endpoints
  • Monitor access logs for unusual patterns of unauthenticated requests to Masteriyo endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Masteriyo - LMS → Version. If version is 1.7.3 or lower, you are vulnerable.

Check Version:

wp plugin get masteriyo-lms --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.7.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual unauthenticated requests to /wp-json/masteriyo/ endpoints
  • Multiple 200 responses to course progress API calls from unauthenticated IPs

Network Indicators:

  • Unusual traffic patterns to Masteriyo REST API endpoints from external IPs without authentication headers

SIEM Query:

source="web_access_logs" AND uri="/wp-json/masteriyo/*" AND status=200 AND NOT (user_agent="*bot*" OR user_agent="*crawl*")

🔗 References

📤 Share & Export