Critical WordPress LearnPress Flaw Allows Unauth Data Deletion

Critical WordPress LearnPress Flaw Allows Unauth Data Deletion

A critical vulnerability, tracked as CVE-2026-4365, has been identified in the LearnPress plugin for WordPress. According to the National Vulnerability Database, this flaw allows for unauthorized data deletion due to a glaring lack of capability checks within the delete_question_answer() function. This affects all LearnPress versions up to and including 4.3.2.8.

The real kicker here is the plugin’s exposure of a wp_rest nonce in public frontend HTML (lpData), even to unauthenticated visitors. This nonce, which should ideally be a unique, single-use token for authenticated actions, is then used as the sole security gate for the lp-load-ajax AJAX dispatcher. With no additional capability or ownership checks on the delete_question_answer action, unauthenticated attackers can simply craft a POST request using this publicly available nonce to delete any quiz answer option. It’s a classic case of broken access control, leading to a critical severity rating.

This isn’t just a minor bug; it’s a gaping hole that could allow bad actors to tamper with educational content, disrupt online courses, or even potentially deface parts of a site that rely on LearnPress. The CVSS score of 9.1 (CRITICAL) underscores the severity, with an attack vector requiring no authentication or user interaction, leading to high impact on integrity and availability.

Related ATT&CK Techniques

🛡️ Detection Rules

5 rules · 5 SIEM formats

5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-4365

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-4365 Auth Bypass LearnPress plugin for WordPress versions <= 4.3.2.8
CVE-2026-4365 Auth Bypass Missing capability check on `delete_question_answer()` function
CVE-2026-4365 Auth Bypass Exposure of `wp_rest` nonce in public frontend HTML (`lpData`)
CVE-2026-4365 Auth Bypass Vulnerable AJAX dispatcher: `lp-load-ajax` with `delete_question_answer` action
CVE-2026-4365 Unauthorized Data Deletion Unauthenticated attackers can delete quiz answer options via crafted POST request

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs