The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-14802

CVE-2025-14802: LearnPress WordPress LMS Auth Bypass Flaw

CVE-2025-14802 is an authentication bypass flaw in LearnPress WordPress LMS Plugin allowing teachers to delete other teachers' lesson files. This post covers the technical details, affected versions, impact, and mitigation.

Updated: January 22, 2026

CVE-2025-14802 Overview

The LearnPress – WordPress LMS Plugin for WordPress contains an unauthorized file deletion vulnerability affecting versions up to and including 4.3.2.2. The flaw exists in the /wp-json/lp/v1/material/{file_id} REST API endpoint due to a critical parameter mismatch between the DELETE operation and its authorization check. Specifically, the endpoint uses file_id from the URL path to determine which file to delete, but the permission callback validates item_id from the request body instead. This inconsistency allows authenticated attackers with teacher-level access to delete arbitrary lesson material files uploaded by other teachers.

Critical Impact

Authenticated attackers with teacher privileges can exploit the authorization bypass to delete other teachers' lesson materials, potentially disrupting educational content and causing data loss across a WordPress LMS platform.

Affected Products

  • LearnPress – WordPress LMS Plugin versions up to and including 4.3.2.2
  • WordPress sites using vulnerable LearnPress plugin versions
  • LMS platforms with teacher-level user accounts

Discovery Timeline

  • 2026-01-07 - CVE CVE-2025-14802 published to NVD
  • 2026-01-08 - Last updated in NVD database

Technical Details for CVE-2025-14802

Vulnerability Analysis

This vulnerability is classified as CWE-639 (Authorization Bypass Through User-Controlled Key), a type of Insecure Direct Object Reference (IDOR) vulnerability. The fundamental issue stems from a parameter mismatch in how the REST API endpoint handles file deletion requests versus how it verifies authorization.

When a DELETE request is sent to the material endpoint, the system extracts two different parameters from two different locations: the file_id from the URL path determines which file gets deleted, while the item_id from the request body is used to check if the requester has permission to perform the action. This architectural flaw creates an authorization bypass where an attacker can supply their own legitimate item_id to pass the permission check while simultaneously specifying a victim's file_id in the URL to target their files.

The attack requires teacher-level authentication, limiting the attack surface to authenticated users with elevated privileges within the LMS. However, in educational environments where multiple teachers manage course content, this vulnerability poses a significant risk to content integrity and availability.

Root Cause

The root cause is a design flaw in the REST API controller's permission validation logic. The class-lp-rest-material-controller.php file implements separate handling for the file identifier used in the DELETE operation and the item identifier validated in the authorization callback. This disconnection between the resource being accessed and the resource being validated creates an exploitable gap in access control. The permission callback trusts that the item_id in the request body corresponds to the file_id in the URL, but no verification ensures these parameters reference the same ownership context.

Attack Vector

The attack vector is network-based and requires authentication with teacher-level privileges. An attacker would craft a malicious DELETE request to the /wp-json/lp/v1/material/{victim_file_id} endpoint, where {victim_file_id} is the identifier of another teacher's material file. In the request body, the attacker includes their own legitimate item_id which they have permission to modify. The permission callback validates against the attacker's item_id and grants access, while the actual deletion operation targets the victim's file specified in the URL path.

The exploitation process involves:

  1. The attacker authenticates as a teacher with access to at least one lesson material
  2. The attacker identifies the file_id of a target file owned by another teacher
  3. The attacker sends a DELETE request with their own item_id in the body but the victim's file_id in the URL
  4. The system validates permissions against the attacker's item_id and approves the request
  5. The system then deletes the file corresponding to the victim's file_id

For detailed code analysis, see the WordPress LearnPress Code Review and the Wordfence Vulnerability Report.

Detection Methods for CVE-2025-14802

Indicators of Compromise

  • Unusual DELETE requests to /wp-json/lp/v1/material/ endpoints with mismatched file_id and item_id parameters
  • Log entries showing teachers accessing or modifying material files outside their assigned courses
  • Reports of missing lesson materials from multiple teachers without legitimate explanations
  • Increased volume of DELETE requests to the LearnPress REST API from teacher accounts

Detection Strategies

  • Implement Web Application Firewall (WAF) rules to detect DELETE requests to LearnPress material endpoints where the authorization context doesn't match the target resource
  • Monitor WordPress REST API access logs for patterns of cross-teacher material access attempts
  • Deploy intrusion detection signatures to alert on DELETE requests to /wp-json/lp/v1/material/ with request body parameters that don't correlate with URL path parameters
  • Review audit logs for file deletion events performed by teachers on content they did not originally upload

Monitoring Recommendations

  • Enable detailed logging for all REST API requests to LearnPress endpoints, capturing both URL parameters and request body content
  • Configure alerts for any file deletion operations affecting lesson materials owned by users other than the requester
  • Implement file integrity monitoring for LearnPress material upload directories to detect unauthorized deletions
  • Establish baseline metrics for normal DELETE operation patterns and alert on statistical anomalies

How to Mitigate CVE-2025-14802

Immediate Actions Required

  • Update LearnPress plugin to version 4.3.2.3 or later, which contains the security fix
  • Audit recent DELETE requests to the LearnPress material API for evidence of exploitation
  • Temporarily restrict teacher-level API access if immediate patching is not possible
  • Review and restore any lesson materials that may have been inappropriately deleted

Patch Information

The vulnerability has been addressed in LearnPress version 4.3.2.3. The fix ensures that the permission callback properly validates ownership against the same file_id used in the DELETE operation, eliminating the parameter mismatch vulnerability. The patched code can be reviewed in the WordPress Plugin Repository.

Workarounds

  • Disable the LearnPress REST API material endpoints if the feature is not essential to operations until patching can be completed
  • Implement additional authorization checks at the web server level to validate request consistency before passing to WordPress
  • Restrict teacher account creation and privileges to only trusted individuals pending the update
  • Use a WordPress security plugin to add custom REST API request validation rules
bash
# Configuration example
# Add to .htaccess to temporarily block vulnerable endpoint
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteCond %{REQUEST_METHOD} DELETE
RewriteCond %{REQUEST_URI} ^/wp-json/lp/v1/material/ [NC]
RewriteRule .* - [F,L]
</IfModule>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechLearnpress

  • SeverityMEDIUM

  • CVSS Score5.4

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-639
  • Technical References
  • WordPress LearnPress Code Review

  • WordPress LearnPress Code Review

  • WordPress LearnPress Code Review

  • WordPress LearnPress Code Review

  • Wordfence Vulnerability Report
  • Related CVEs
  • CVE-2026-25002: LearnPress Sepay Auth Bypass Vulnerability

  • CVE-2026-3225: LearnPress WordPress LMS Auth Bypass Flaw

  • CVE-2026-3226: LearnPress WordPress Plugin Auth Bypass Flaw

  • CVE-2026-1787: LearnPress Auth Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English