Academy LMS – WordPress LMS Plugin for Complete eLearning Solution …

Academy LMS – WordPress LMS Plugin for Complete eLearning Solution …

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-25372 affects Academy LMS – WordPress LMS Plugin for Complete eLearning Solution (slug: academy) in versions up to and including 3.5.3. The reported severity is Medium (CVSS 4.3).

This issue can be abused by an authenticated user who already has an account on your WordPress site and holds instructor-level access (or higher). In practical business terms, the main exposure is not “drive-by” anonymous traffic, but rather misuse by internal users, contractors, partners, or compromised instructor accounts.

Security Weakness

The vulnerability is described as a missing authorization / capability check on a plugin function. When capability checks are missing, WordPress may allow a logged-in user to trigger actions that should be restricted to higher-privilege roles.

Because the advisory indicates the attacker must be at least an instructor, the risk hinges on how broadly instructor accounts are issued, how strong your login controls are (MFA, password policy), and whether instructor accounts are shared or reused across teams.

Reference: CVE record and Wordfence intelligence entry: Wordfence source.

Technical or Business Impacts

The advisory states that authenticated attackers with instructor-level access and above may be able to perform an unauthorized action. While the specific action is not detailed in the provided summary, the business risk is clear: your organization could face unexpected changes within the learning platform workflow that may affect courses, learners, or operational integrity.

Potential business impacts to consider include: disruption to training delivery timelines, additional support burden for marketing/enablement teams, compliance concerns if training records or course governance are affected, and reputational risk if customers or employees experience inconsistent learning access or content changes.

Mitigation and risk decisions: there is no known patch available per the provided remediation guidance. Based on your organization’s risk tolerance, the safest option may be to uninstall the affected software and move to a replacement. If immediate removal is not feasible, reduce exposure by limiting who receives instructor roles, auditing existing instructor accounts, enforcing strong authentication controls, and monitoring administrative/instructor activity for unexpected actions.

Similar attacks: authorization flaws in web applications and plugins are a common path to privileged actions by lower-privileged users. Examples of widely documented authorization issues include CVE-2023-22515 (Atlassian Confluence privilege/authorization-related impact), CVE-2021-3129 (Laravel framework attack chain often used after gaining app-level access), and CVE-2018-7600 (Drupal “Drupalgeddon 2” leading to unauthorized actions).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers