Attack Vectors
CVE-2026-25372 affects Academy LMS – WordPress LMS Plugin for Complete eLearning Solution (slug: academy) in versions up to and including 3.5.3. The reported severity is Medium (CVSS 4.3).
This issue can be abused by an authenticated user who already has an account on your WordPress site and holds instructor-level access (or higher). In practical business terms, the main exposure is not “drive-by” anonymous traffic, but rather misuse by internal users, contractors, partners, or compromised instructor accounts.
Security Weakness
The vulnerability is described as a missing authorization / capability check on a plugin function. When capability checks are missing, WordPress may allow a logged-in user to trigger actions that should be restricted to higher-privilege roles.
Because the advisory indicates the attacker must be at least an instructor, the risk hinges on how broadly instructor accounts are issued, how strong your login controls are (MFA, password policy), and whether instructor accounts are shared or reused across teams.
Reference: CVE record and Wordfence intelligence entry: Wordfence source.
Technical or Business Impacts
The advisory states that authenticated attackers with instructor-level access and above may be able to perform an unauthorized action. While the specific action is not detailed in the provided summary, the business risk is clear: your organization could face unexpected changes within the learning platform workflow that may affect courses, learners, or operational integrity.
Potential business impacts to consider include: disruption to training delivery timelines, additional support burden for marketing/enablement teams, compliance concerns if training records or course governance are affected, and reputational risk if customers or employees experience inconsistent learning access or content changes.
Mitigation and risk decisions: there is no known patch available per the provided remediation guidance. Based on your organization’s risk tolerance, the safest option may be to uninstall the affected software and move to a replacement. If immediate removal is not feasible, reduce exposure by limiting who receives instructor roles, auditing existing instructor accounts, enforcing strong authentication controls, and monitoring administrative/instructor activity for unexpected actions.
Similar attacks: authorization flaws in web applications and plugins are a common path to privileged actions by lower-privileged users. Examples of widely documented authorization issues include CVE-2023-22515 (Atlassian Confluence privilege/authorization-related impact), CVE-2021-3129 (Laravel framework attack chain often used after gaining app-level access), and CVE-2018-7600 (Drupal “Drupalgeddon 2” leading to unauthorized actions).
Recent Comments