CVE-2025-15347

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users with contributor-level access or higher to modify arbitrary WordPress options due to missing capability checks in the Creator LMS plugin. Attackers can escalate privileges, modify site settings, or take full control of affected WordPress sites. All WordPress sites using Creator LMS version 1.1.12 or earlier are affected.

💻 Affected Systems

Products:
  • Creator LMS – The LMS for Creators, Coaches, and Trainers WordPress plugin
Versions: All versions up to and including 1.1.12
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with at least contributor-level access. WordPress multisite installations may have different impact levels.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative privileges, modify critical WordPress options, inject malicious code, or deface the entire website.

🟠

Likely Case

Privilege escalation allowing attackers to gain administrative access, modify plugin settings, or disrupt site functionality.

🟢

If Mitigated

Limited impact if proper access controls, network segmentation, and monitoring are in place to detect unauthorized option modifications.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once authenticated. The vulnerability is in a REST API endpoint that lacks proper authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.13

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3433193/creatorlms/tags/1.1.13/includes/Rest/V1/SettingsController.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Creator LMS plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 1.1.13 from WordPress.org and manually replace the plugin files.

🔧 Temporary Workarounds

Disable Creator LMS Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate creatorlms

Restrict Contributor Access

linux

Temporarily remove contributor-level access from untrusted users

wp user list --role=contributor --field=ID | xargs wp user set-role subscriber

🧯 If You Can't Patch

  • Implement strict access controls and limit contributor-level accounts to trusted users only
  • Deploy web application firewall rules to block suspicious REST API requests to the Creator LMS endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Creator LMS → Version number. If version is 1.1.12 or lower, the site is vulnerable.

Check Version:

wp plugin get creatorlms --field=version

Verify Fix Applied:

Verify Creator LMS plugin version is 1.1.13 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual REST API POST/PUT requests to /wp-json/creatorlms/v1/settings endpoint from contributor-level users
  • Sudden changes to WordPress options table from non-admin users
  • Multiple failed authorization attempts followed by successful settings modifications

Network Indicators:

  • HTTP POST requests to /wp-json/creatorlms/v1/settings with option modification parameters
  • Unusual traffic patterns from internal user accounts to WordPress REST API

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-json/creatorlms/v1/settings" OR message="option_update") AND user_role="contributor"

🔗 References

📤 Share & Export