CVE-2024-37094

8.2 HIGH

📋 TL;DR

This CVE describes a missing authorization vulnerability in the MasterStudy LMS WordPress plugin that allows attackers to bypass access controls and perform unauthorized actions. The vulnerability affects all versions up to 3.2.12, potentially impacting any WordPress site using this learning management system plugin.

💻 Affected Systems

Products:
  • MasterStudy LMS WordPress Plugin
Versions: All versions up to and including 3.2.12
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with MasterStudy LMS plugin installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify course content, access student data, manipulate user roles, or compromise the entire WordPress installation through privilege escalation.

🟠

Likely Case

Unauthorized users accessing restricted functionality such as viewing/modifying courses, accessing student information, or manipulating plugin settings.

🟢

If Mitigated

With proper access controls and authentication mechanisms, impact would be limited to authorized users only performing intended actions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but can be performed by users with minimal privileges to escalate access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.13 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/masterstudy-lms-learning-management-system/wordpress-masterstudy-lms-plugin-3-2-12-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find MasterStudy LMS
4. Click 'Update Now' if available
5. If not available, download latest version from WordPress repository
6. Deactivate, delete old version, upload and activate new version

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the MasterStudy LMS plugin until patched

wp plugin deactivate masterstudy-lms-learning-management-system

Access Restriction via .htaccess

linux

Restrict access to plugin directories

# Add to .htaccess in wp-content/plugins/masterstudy-lms-learning-management-system/
Order Deny,Allow
Deny from all

🧯 If You Can't Patch

  • Implement strict role-based access controls and audit all user permissions
  • Monitor plugin directories for unauthorized access attempts and implement WAF rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > MasterStudy LMS version. If version is 3.2.12 or lower, system is vulnerable.

Check Version:

wp plugin get masterstudy-lms-learning-management-system --field=version

Verify Fix Applied:

Verify plugin version is 3.2.13 or higher in WordPress admin panel and test access controls for restricted functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to MasterStudy LMS admin endpoints
  • User role changes without proper authorization
  • Unexpected course or user data modifications

Network Indicators:

  • HTTP requests to /wp-content/plugins/masterstudy-lms-learning-management-system/ with unauthorized parameters
  • POST requests to LMS admin endpoints from non-admin users

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" OR uri_path CONTAINS "masterstudy-lms") AND (user_role!="administrator" OR user_id NOT IN authorized_users)

🔗 References

📤 Share & Export