CVE-2023-6634

HIGH EXPLOITED NUCLEI

LearnPress <4.2.5.7 - Command Injection

Title source: llm

Description

The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.

Exploits (1)

nomisec WORKING POC 4 stars
by krn966 · remote
https://github.com/krn966/CVE-2023-6634

Nuclei Templates (1)

LearnPress < 4.2.5.8 - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.html:/wp-content/plugins/learnpress
FOFA: body=/wp-content/plugins/learnpress

Scores

CVSS v3 8.1
EPSS 0.9133
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2024-01-04

Classification

CWE
CWE-88 CWE-77
Status published

Affected Products (1)

thimpress/learnpress < 4.2.5.7

Timeline

Published Jan 11, 2024
Tracked Since Feb 18, 2026