CVE-2023-6634
HIGH EXPLOITED NUCLEILearnPress <4.2.5.7 - Command Injection
Title source: llmDescription
The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.
Exploits (1)
Nuclei Templates (1)
LearnPress < 4.2.5.8 - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
http.html:/wp-content/plugins/learnpress
FOFA:
body=/wp-content/plugins/learnpress
Scores
CVSS v3
8.1
EPSS
0.9133
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2024-01-04
Classification
CWE
CWE-88
CWE-77
Status
published
Affected Products (1)
thimpress/learnpress
< 4.2.5.7
Timeline
Published
Jan 11, 2024
Tracked Since
Feb 18, 2026