Platform
wordpress
Component
learnpress
Fixed in
4.2.6
CVE-2023-6567 is a critical SQL Injection vulnerability affecting the LearnPress plugin for WordPress. This vulnerability allows unauthenticated attackers to inject malicious SQL queries, potentially leading to data exfiltration. The issue impacts versions of LearnPress up to and including 4.2.5.7. A patch is available to address this vulnerability.
The SQL Injection vulnerability in LearnPress allows attackers to manipulate database queries through the ‘order_by’ parameter. Successful exploitation could enable attackers to extract sensitive information stored within the WordPress database, such as user credentials, course details, and payment information. Depending on the database structure and permissions, an attacker might even be able to modify or delete data. This vulnerability is particularly concerning given the prevalence of WordPress and the potential for widespread impact if exploited in a large number of LearnPress installations.
CVE-2023-6567 was publicly disclosed on January 11, 2024. While no active exploitation campaigns have been definitively confirmed, the CRITICAL severity and ease of exploitation make it a high-priority target. Public proof-of-concept exploits are likely to emerge, increasing the risk of widespread exploitation. This vulnerability is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
82.25% (99% percentile)
CVSS Vector
The primary mitigation for CVE-2023-6567 is to immediately update LearnPress to a version that includes the fix. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) rule to filter requests containing suspicious SQL syntax in the ‘order_by’ parameter. Carefully review and sanitize any user input used in SQL queries within the LearnPress plugin. After upgrading, confirm the vulnerability is resolved by attempting a SQL injection attack on the affected endpoint and verifying that the query is properly sanitized.
Update the LearnPress plugin to the latest available version. Version 4.2.5.8 or higher corrects the SQL Injection (SQL Injection) vulnerability. This can be done through the WordPress admin panel, in the plugins section.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2023-6567 is a critical SQL Injection vulnerability in the LearnPress WordPress LMS plugin, allowing attackers to potentially extract sensitive data from the database.
You are affected if you are using LearnPress version 4.2.5.7 or earlier. Immediately check your plugin version and upgrade if necessary.
Upgrade LearnPress to the latest version, which includes the necessary fix. Consider a WAF as a temporary mitigation if upgrading is not immediately possible.
While no confirmed active exploitation campaigns are currently known, the vulnerability's severity and ease of exploitation suggest a high likelihood of future attacks.
Refer to the LearnPress official website and WordPress security announcements for the latest advisory and update information.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.