LearnPress – Backup & Migration Tool Vulnerability (Medium) – CVE-2…

LearnPress – Backup & Migration Tool Vulnerability (Medium) – CVE-2…

by | Feb 26, 2026 | Plugins

Attack Vectors

LearnPress – Backup & Migration Tool (plugin slug: learnpress-import-export) is affected by a Medium-severity Reflected Cross-Site Scripting (XSS) vulnerability (CVE-2025-49992, CVSS 6.1). In practical terms, an attacker can craft a malicious link that contains injected script content and then attempt to trick someone at your organization into clicking it.

Because this issue is described as exploitable by unauthenticated attackers, the attacker does not need a login to your WordPress site to attempt the attack. However, it typically requires user interaction (for example, clicking a link delivered via email, chat, or a spoofed internal message).

This is especially relevant to marketing and operations teams who frequently click links related to campaigns, site changes, backups, or analytics—making social engineering (phishing-like outreach) a realistic delivery method for the malicious URL.

Security Weakness

The vulnerability affects LearnPress Export Import versions up to and including 4.0.9. The reported root cause is insufficient input sanitization and output escaping, which can allow untrusted data to be reflected back into a page in a way that the browser interprets as executable script.

Reflected XSS issues are often overlooked because they can look like “just a link problem,” but they can still be used to run attacker-controlled code in a victim’s browser in the context of your site—potentially impacting sessions, user trust, and downstream systems connected to site workflows.

Remediation is straightforward: update to version 4.1.0 or newer (a patched release). You can track the CVE record here: CVE-2025-49992. Source details are available from Wordfence: Wordfence vulnerability entry.

Technical or Business Impacts

While rated Medium, reflected XSS can carry meaningful business risk because it targets the people behind the website—marketing, finance, executives, and compliance staff—rather than the server alone. If a targeted user clicks a malicious link, the attacker’s script may run in that user’s browser and can potentially:

1) Undermine trust and brand reputation: If users or staff experience unexpected popups, redirects, or suspicious behavior “on your domain,” it can erode confidence in your brand and raise concerns among customers, partners, or auditors.

2) Enable account or workflow disruption: Depending on what the victim is doing and what protections are in place, browser-executed scripts may attempt to interfere with admin workflows (such as initiating actions or altering what a user sees), increasing the chance of mistakes during sensitive tasks like backups, migrations, or content updates.

3) Increase compliance and incident response burden: Even a “medium” issue can trigger internal reporting, forensic review, or client notifications if it’s suspected that an employee was targeted and sensitive operations were affected.

Recommended action: Identify any site running LearnPress Export Import version 4.0.9 or earlier and update to 4.1.0+ as soon as practical, prioritizing sites used for revenue-generating campaigns or with frequent administrator activity.

Similar Attacks

Reflected XSS has been used in many real-world incidents as a stepping stone to broader compromise via social engineering and browser-based execution. Examples include:

CISA alert: active exploitation involving ManageEngine (historical example of web application exploitation leading to broader risk)
MySpace “Samy” worm (2005): a famous XSS-driven worm demonstrating how script injection can spread and impact trust
OWASP overview of Cross-Site Scripting (XSS): real-world patterns and impacts

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers