MasterStudy LMS WordPress Plugin – for Online Courses and Education…

MasterStudy LMS WordPress Plugin – for Online Courses and Education…

by | Feb 13, 2026 | Plugins

Attack Vectors

CVE-2026-0559 (Medium severity, CVSS 6.4) affects the MasterStudy LMS WordPress Plugin – for Online Courses and Education (slug: masterstudy-lms-learning-management-system) in versions up to and including 3.7.11. The issue is an authenticated Stored Cross-Site Scripting (XSS) vulnerability tied to the plugin’s stm_lms_courses_grid_display shortcode.

The most likely attack path is through a legitimate WordPress user account with Contributor-level access or higher. An attacker (or compromised user account) can inject malicious script content via user-supplied shortcode attributes. Because it is stored, the injected script can execute later whenever someone loads the affected page—without requiring the victim to click anything or take extra steps.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping for user-supplied attributes in the stm_lms_courses_grid_display shortcode. In business terms, this means the site may accept untrusted content and then display it to visitors and staff in a way that allows attacker-controlled code to run in the browser.

This weakness is particularly relevant for organizations where multiple people publish content (marketing teams, course admins, contractors, or regional teams). Even if only “trusted” users have Contributor access, account compromise, turnover, or permission drift can create a realistic path to exploitation.

Technical or Business Impacts

Stored XSS can create business risk beyond a single page defacement. It can undermine brand trust by altering on-site messaging, redirecting users, or presenting misleading content—especially harmful on high-traffic landing pages, course catalogs, or enrollment flows.

Operationally, it can expose sensitive sessions and disrupt decision-critical workflows. For example, malicious scripts may interfere with analytics integrity, lead capture forms, course purchase flows, or staff administrative actions performed in the browser. For compliance and risk teams, this raises concerns about unauthorized changes, potential exposure of user data processed in the browser, and audit findings related to access control and web application security hygiene.

Recommended remediation: Update MasterStudy LMS WordPress Plugin – for Online Courses and Education to version 3.7.12 or newer (patched). Prioritize sites where Contributors can publish or edit pages using the affected shortcode, and treat this as a time-sensitive fix due to the risk of persistent, user-facing impact.

Similar Attacks

Stored XSS issues in WordPress plugins are a well-known and frequently exploited class of vulnerability because they can persist on a page and impact every visitor until removed. A few real-world examples include:

Wordfence vulnerability roundups documenting Stored XSS patterns in WordPress plugins (Wordfence Blog)

Overview of Cross-Site Scripting (XSS) and why it matters to organizations (Acunetix)

Business-focused explanation of XSS impacts (Cloudflare Learning Center)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers