LearnDash LMS Vulnerability (Medium) – CVE-2024-1210

LearnDash LMS Vulnerability (Medium) – CVE-2024-1210

by | Mar 10, 2026 | Plugins

Attack Vectors

LearnDash LMS (WordPress plugin slug: sfwd-lms) has a Medium-severity vulnerability (CVE-2024-1210, CVSS 5.3) that can be exploited over the internet by an unauthenticated attacker. The issue is tied to how certain content is exposed via the plugin’s API in versions up to and including 4.10.1.

From a business perspective, this means someone does not need a valid login to request and retrieve quiz-related data. If your training, certification, onboarding, or paid course content relies on quizzes, this can be targeted by competitors, cheating rings, or anyone attempting to access content without authorization.

Reference: CVE-2024-1210 record and the vendor/community write-up from Wordfence.

Security Weakness

This is categorized as Sensitive Information Exposure via API. In affected versions of LearnDash LMS (≤ 4.10.1), the API can disclose quiz access to users who are not authenticated. While this vulnerability does not indicate data tampering or site takeover on its own, it is still a meaningful control failure: content that should be gated behind authentication is accessible externally.

Remediation: Update LearnDash LMS to version 4.10.2 or newer (patched). After updating, confirm that the plugin and WordPress are fully up to date across all environments (production, staging, and any cloned marketing sites) to avoid leaving an exposed instance online.

Technical or Business Impacts

The primary impact is unauthorized access to quizzes. For organizations, this can translate into:

Revenue and content protection risk: If quizzes are part of paid course value or certification gating, unauthorized access can reduce course value and enable content scraping.

Assessment integrity risk: For compliance training, partner enablement, or employee certification programs, leaked quiz content can undermine the credibility of completion metrics and audit readiness.

Brand and trust risk: If customers or partners discover that course assessments are publicly retrievable, it can create reputational damage—especially when training outcomes are used in sales enablement or regulated workflows.

Operational risk: Incident response (investigations, communications, and reissuing assessments) can create unplanned workload for Marketing Ops, L&D teams, and Compliance.

Similar Attacks

API and endpoint exposure issues are a recurring theme in widely used platforms. Examples include:

CVE-2017-5487 (WordPress REST API user enumeration) — an example of how publicly reachable endpoints can inadvertently expose information.
CVE-2017-1001000 (WordPress REST API content injection) — a high-visibility case showing how API design and authorization controls can materially affect business risk.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers