Skip to main content

Critical vulnerabilities in e-learning platform WordPress plugins 2020

Three WordPress vulnerabilities commonly used by e-learning and Fortune 500 were subject to severe security issues, researchers say.

On 30 April 2020, Check Point published research surrounding three popular WordPress plugins, LearnPress, LearnDash, and LifterLMS, learning management systems (LMS) widely used for educational purposes especially at a time when distance learning is being more widely adopted due to the coronavirus outbreak.

Critical vulnerabilities in e-learning platform WordPress plugins 2020
Critical vulnerabilities in e-learning platform WordPress plugins 2020

LMS platforms can be used to manage online courses, both free and paid, as well as to host student resources, issue and mark assignments, and to facilitate discussion between students.

LearnPress, developed by ThimPress, is a plugin for creating and publishing courses with over 80,000 active installations. LearnDash is another LMS course creation bolt-on used by universities and Fortune 500 companies -- roughly 33,000 websites in total -- and LifterLMS is a course and membership website creation plugin with at least 10,000 active installs.

Check Point examined these plugins in-depth, finding four vulnerabilities -- CVE-2020-6008, CVE-2020-6009, CVE-2020-6010, and CVE-2020-6011 -- which ranged from privilege escalation to remote code execution (RCE).

"These vulnerabilities allow regular students and sometimes even unauthenticated users to gain sensitive information or take control of the LMS platforms," the team said.

It is possible, Check Point says, for students or remote, unauthenticated attackers to exploit the security flaws to hijack e-learning platforms, steal sensitive data, change grades, tamper with assignments, forge certificates, and potentially siphon money away from LMS platforms offering paid courses.

The WordPress plugin analysis took place in March over the course of two weeks. The first vulnerability, CVE-2020-6010, impacts LearnPress versions 3.2.6.7 and below. This vulnerability is an SQL injection flaw deemed "trivial" to exploit by the research team.

The second vulnerability, CVE-2020-6011, also impacts the same LMS plugin. This particular bug was caused by legacy code left in the system and could be used to give a user the same privileges as a teacher -- without checking on account permissions.

"Both of the vulnerabilities we reported received the same treatment from the author -- the vulnerable functions were completely purged from the new patched version," the researchers noted. "A classic case of "the best code is no code at all.""

Another vulnerability, CVE-2020-11511, was also disclosed by the Wordfence security team on April 28. Versions 3.2.6.9 and below are impacted by the bug, which can be exploited to elevate privileges to an "instructor" level, similar to that of an author.

LearnDash, versions 3.1.6 and below, is susceptible to CVE-2020-6009, described as an unauthenticated second-order SQL injection issue. A function, learndash_get_course_groups, fails to sanitize user-supplied data fully, and can, therefore, be used to trigger an SQL injection attack by a user without authentication.

CVE-2020-6008 is an arbitrary file-write vulnerability found in LifterLMS versions 3.37.15 and below. This security flaw exists in how PHP and Ajax files are handled, granting attackers the opportunity to intercept requests to write PHP files without permission and remotely execute code.

The vendors were contacted with Check Point's findings and updated, patched versions have since been released. Users should make sure their plugins are up-to-date to stay protected.
Critical vulnerabilities in e-learning platform WordPress plugins 2020
Critical vulnerabilities in e-learning platform WordPress plugins 2020


"Top educational institutions, as well as many online academies, rely on the systems that we researched in order to run their entire online courses and training programs," commented Check Point vulnerability researcher Omri Herscovici. "We urge the relevant educational establishment[s] everywhere to update to the latest versions of all the platforms."

Earlier this month, a cross-site scripting (XSS) vulnerability was found in OneTone, a WordPress theme developed by Magee WP. The bug permitted attackers to inject malicious code into the settings area of the theme, allowing the creation of backdoor administrator accounts.

Comments

Popular posts from this blog

Tappay payment gateway integration woocommerce

TapPay  offers fast  payment  flow integration, allowing your customers to  pay  with a click of a button instead of redirecting to other websites, in this article you will see how you can integrate  Tappay payment gateway with woocommerce . how you get  Tappay payment gateway woocommerce module and integrate it. When it comes to data security,  TapPay is also very safe and reliable . TapPay provides friendly and flexible payment service, which allows citiesocial users to enjoy wonderful shopping experience.It has a significant impact on improving e-commerce conversion rate and lower operation cost. Tappay payment gateway integration woocommerce Tappay payment gateway integration woocommerce Integrated Payments Exclusive Cross-site modules for seamless checkout experiences Tokenized card management, Card-Free experience and self-updating card expiration dates TapPay is compatible with multiple payment method and E-wallet, including Apple Pay / Goo...

Parasut Accounting & Invoicing integration with woocommerce

Parasut Accounting & Invoicing integration with woocommerce  Parasut is a cloud-based finance management application for Small Business Owners in Turkey. Please use Paraşüt mobile application alongside the web application to benefit from all features.  Paraşüt Accounting & Invoicing integration with woocommerce is useful for automation and fast process stop manual creating invoice will save time and efforts. Why e-Invoice with Parasut ? Manage your application processes with our e-invoice transition consultant.  Switch to e-invoice within 30 minutes* without leaving your seat. Parasut Accounting & Invoicing integration with woocommerce Use it at Affordable Prices Get rid of fees such as integration and training fees.  Send e-invoices with affordable e-top-up prices. Integrated Pre-Accounting When using e-document services with Paraşüt, manage your financial data from anywhere thanks to the features that will allow you to manage your preliminary accounting...

BARCLAYCARD EPDQ payment gateway integration woocommerce

  WordPress WooCommerce Barclaycard ePDQ Payment Plugin supports the Hidden Authorisation. The Hidden Authorisation gives you the advantage that customers no longer have to leave your shop in order to enter their credit card data. The processing occurs unnoticed in the background between WordPress WooCommerce and Barclaycard ePDQ. No credit card data is saved. Requires PCI DSS SAQ A-EP Certification. In addition to Hidden Authorization, other authorization methods that are fully PCI DSS compliant (Payment Page, Widget, Iframe, etc.) are also supported. A detailed list of supported features can be found below. BARCLAYCARD EPDQ payment gateway integration woocommerce BARCLAYCARD EPDQ payment gateway integration woocommerce main points Compatibility with Barclaycard ePDQ (essential, extra, or extra plus) The ability to process refunds directly in your WooCommerce admin panel Secure 3D Secure v2 authentication PSD2 & SCA compliance A setup wizard to guide you through the integratio...