vulnerability
WordPress Plugin: lifterlms: CVE-2025-11923: Improper Privilege Management
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Nov 12, 2025 | Nov 13, 2025 | Nov 14, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Nov 12, 2025
Added
Nov 13, 2025
Modified
Nov 14, 2025
Description
The LifterLMS – WP LMS for eLearning, Online Courses, and Quizzes plugin for WordPress is vulnerable to privilege escalation. This is due to the plugin not properly validating a user's identity prior to allowing them to modify their own role via the REST API. The permission check in the update_item_permissions_check() function returns true when a user updates their own account without verifying the role changes. This makes it possible for authenticated attackers, with student-level access and above, to escalate their privileges to administrator by updating their own roles array via a crafted REST API request. Another endpoint intended for instructors also provides an attack vector. Affected version ranges are 3.5.3 - 3.41.2, 4.0.0 - 4.21.3, 5.0.0 - 5.10.0, 6.0.0 - 6.11.0, 7.0.0 - 7.8.7, 8.0.0 - 8.0.7, 9.0.0 - 9.0.7, 9.1.0.
Solution
lifterlms-plugin-cve-2025-11923
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.