CVE-2023-6634
HIGH EXPLOITED NUCLEILearnPress <4.2.5.7 - Command Injection
Title source: llmDescription
The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.
Exploits (1)
Nuclei Templates (1)
LearnPress < 4.2.5.8 - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.html:/wp-content/plugins/learnpress
FOFA:
body=/wp-content/plugins/learnpress
Scores
CVSS v3
8.1
EPSS
0.9133
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
VulnCheck KEV
2024-01-04
CWE
CWE-77
CWE-88
Status
published
Products (2)
thimpress/learnpress
< 4.2.5.7
thimpress/LearnPress – WordPress LMS Plugin for Create and Sell Online Courses
< 4.2.5.7
Published
Jan 11, 2024
Tracked Since
Feb 18, 2026