CVE-2024-6099
📋 TL;DR
This vulnerability allows unauthenticated attackers to bypass user registration controls in the LearnPress WordPress LMS plugin. Attackers can register accounts with the default role even when registration is disabled, affecting WordPress sites using vulnerable plugin versions.
💻 Affected Systems
- LearnPress - WordPress LMS Plugin
📦 What is this software?
Learnpress by Thimpress
⚠️ Risk & Real-World Impact
Worst Case
Attackers create administrative accounts, gain full control of the WordPress site, and potentially compromise the entire web server infrastructure.
Likely Case
Attackers create user accounts to access restricted content, post spam, or use the site as a foothold for further attacks.
If Mitigated
With proper monitoring, unauthorized accounts can be detected and removed before causing significant damage.
🎯 Exploit Status
The vulnerability is in a public function with missing validation checks, making exploitation straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.2.6.8.2 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3109339/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find LearnPress and click 'Update Now'. 4. Verify version is 4.2.6.8.2 or higher.
🔧 Temporary Workarounds
Disable LearnPress Plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate learnpress
Restrict Access to Checkout
allUse web application firewall to block suspicious registration attempts
🧯 If You Can't Patch
- Implement strict user account monitoring and review all new registrations
- Enable two-factor authentication for all user roles and implement IP-based rate limiting
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel → Plugins → LearnPress version. If version is 4.2.6.8.1 or lower, you are vulnerable.
Check Version:
wp plugin get learnpress --field=version
Verify Fix Applied:
After updating, verify LearnPress version is 4.2.6.8.2 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual user registration activity, especially when registration is disabled
- Multiple user accounts created from same IP in short timeframe
Network Indicators:
- HTTP POST requests to /checkout endpoint with registration parameters
- Unusual traffic patterns to user registration endpoints
SIEM Query:
source="wordpress.log" AND "user registered" AND NOT "admin" AND rate > 5 per hour
🔗 References
- https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.8.1/inc/class-lp-checkout.php#L124
- https://plugins.trac.wordpress.org/changeset/3109339/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/7ee714c7-4c9b-4627-9ba9-f83aeca6a0a5?source=cve
- https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.8.1/inc/class-lp-checkout.php#L124
- https://plugins.trac.wordpress.org/changeset/3109339/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/7ee714c7-4c9b-4627-9ba9-f83aeca6a0a5?source=cve