teachPress Vulnerability (Medium) – CVE-2025-32149

teachPress Vulnerability (Medium) – CVE-2025-32149

by | Feb 26, 2026 | Plugins

Attack Vectors

Product: teachPress (WordPress plugin, slug: teachpress)

Vulnerability: Authenticated SQL Injection affecting teachPress versions up to and including 9.0.11. This is rated Medium severity (CVSS 3.1 score 6.5, vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).

Who can exploit it: An attacker must already have a WordPress account with at least Contributor privileges (or higher). That makes this especially relevant for organizations with many authors, agencies, freelancers, interns, or shared credentials.

How it’s triggered: The flaw stems from a user-supplied parameter being handled unsafely in an SQL query. An authenticated attacker can potentially append additional SQL to an existing query, enabling database data to be extracted.

Reference: CVE CVE-2025-32149 (Source: Wordfence Threat Intel).

Security Weakness

The vulnerability is caused by insufficient escaping of a user-supplied parameter combined with a lack of sufficient preparation of an existing SQL query. In practical terms, this weakness can allow an authenticated user (Contributor+) to manipulate how the database is queried.

While the severity is classified as Medium, the CVSS metrics indicate a meaningful business risk because it is remotely reachable over the network, requires low attack complexity, and can result in high confidentiality impact (data exposure).

Technical or Business Impacts

Potential data exposure: Successful SQL injection can enable extraction of sensitive information from the WordPress database. Depending on what’s stored, this may include user records and other business-critical data.

Regulatory and contractual risk: If personal data is exposed, the incident can trigger privacy obligations (e.g., breach notification timelines), customer contract issues, and audit findings. For compliance teams, this is a classic “access controls + data exposure” scenario because the attacker is authenticated, but not authorized to access certain data.

Brand and revenue impact: Even without website downtime, data leakage can lead to reputational damage, lost customer trust, increased support burden, and potential churn—especially if the site supports lead generation, course delivery, or academic/professional content workflows tied to teachPress.

Similar Attacks (real examples): SQL injection is a well-known path to database exposure in web applications. For context, here are a few publicly documented incidents:
eBay asks users to change passwords after cyberattack (2014),
LinkedIn password leak (reported 2012).

Remediation: Update teachPress to version 9.0.12 or newer (patched). As a practical risk-reduction step, also review who has Contributor access or above, remove unused accounts, and ensure strong authentication practices for any roles that can log in.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers