LearnPress – WordPress LMS Plugin for Create and Sell Online Course…

LearnPress – WordPress LMS Plugin for Create and Sell Online Course…

by | Mar 11, 2026 | Plugins

Attack Vectors

CVE-2026-3226 affects the LearnPress – WordPress LMS Plugin for Create and Sell Online Courses (slug: learnpress) in versions 4.3.2.8 and below. This is a Medium severity issue (CVSS 4.3) that can be exploited by an authenticated user with Subscriber-level access or higher.

The core problem is that LearnPress uses an AJAX dispatcher (AbstractAjax::catch_lp_ajax()) that verifies a wp_rest nonce but does not enforce an authorization check (current_user_can()) before it routes requests to email-related handlers. Because the wp_rest nonce is embedded in frontend JavaScript for authenticated users, a low-privileged account can use it to call email-notification endpoints that should be restricted.

In practical terms, any user who can log in (including basic subscribers, students, or trial accounts) may be able to trigger LearnPress email notifications on demand by invoking functions in the SendEmailAjax class.

Security Weakness

The vulnerability is caused by missing authorization (capability) checks across all 10 functions in the SendEmailAjax class in affected versions. While a nonce helps reduce cross-site request forgery risk, it is not a replacement for permission checks—especially when that nonce is available to any authenticated session.

This weakness is categorized as a Missing Authorization flaw: the system confirms that the request looks “valid” (nonce present) but fails to confirm the user is allowed to perform the action (no role/capability enforcement).

Technical or Business Impacts

Although the CVSS impact is rated Medium and does not indicate direct data theft, the business risk can still be meaningful for organizations running training, customer education, or paid course operations on WordPress.

Potential impacts include:

Email abuse and brand damage: Unauthorized triggering of email notifications can lead to unexpected or confusing emails being sent from your domain. This can erode trust with learners/customers and create support overhead.

Deliverability and compliance risk: Increased or abnormal notification volume may harm sender reputation and email deliverability. Depending on your notification content and audience, it can also complicate compliance obligations (for example, complaints, unsubscribe handling, and communications governance).

Operational disruption: Even without “hacking” outcomes like data extraction, the ability for low-privileged users to trigger email workflows can create noise for marketing and support teams and disrupt course operations.

Remediation: Update LearnPress to version 4.3.3 or newer (patched). After updating, review user roles (especially Subscriber/student roles), ensure only necessary accounts exist, and monitor outbound email volumes for anomalies.

Similar attacks (real-world examples): Authorization gaps and low-privilege abuse are common patterns in WordPress plugin vulnerabilities. Examples include CVE-2023-27372 (WP User Frontend Pro – privilege/authorization issues reported in the ecosystem) and CVE-2023-3460 (WordPress plugin authorization weakness pattern), where missing capability checks enable actions that should be admin-only.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers