CVE-2024-8522
CRITICAL EXPLOITED NUCLEILearnPress - WordPress LMS Plugin <4.2.7 - SQL Injection
Title source: llmDescription
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_only_fields' parameter of the /wp-json/learnpress/v1/courses REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Exploits (3)
exploitdb
WORKING POC
by Francisco Moraga (BTshell) · textwebappsphp
https://www.exploit-db.com/exploits/52171
metasploit
WORKING POC
by abrahack, Valentin Lobstein, Achref Ben Thameur a.k.a achrefthameur · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_learnpress_c_fields_sqli.rb
Nuclei Templates (1)
LearnPress < 4.2.7.1 - SQL Injection
CRITICALby pdresearch,iamnoooob,rootxharsh
Shodan:
html:"/wp-content/plugins/learnpress"
FOFA:
body="/wp-content/plugins/learnpress"
References (4)
Scores
CVSS v3
10.0
EPSS
0.8805
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2024-09-12
CWE
CWE-89
Status
published
Products (2)
thimpress/learnpress
< 4.2.7.1
thimpress/LearnPress – WordPress LMS Plugin for Create and Sell Online Courses
< 4.2.7
Published
Sep 12, 2024
Tracked Since
Feb 18, 2026