Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-4365 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: LearnPress plugin (v4.3.2.8 & older) has a critical flaw in `delete_question_answer`. <br>⚠️ **Consequences**: Attackers can delete **any** quiz answer options without permission.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **Missing Authorization Check** (CWE-862). <br>πŸ” **Flaw**: The function lacks proper capability verification. It trusts the request blindly, allowing unauthorized actions. 🚫

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: WordPress Plugin **LearnPress**. <br>πŸ“¦ **Version**: **4.3.2.8 and earlier**. <br>🏒 **Vendor**: ThimPress. If you use this LMS plugin, you are at risk! ⚠️

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Power**: Delete **arbitrary** quiz answer options. <br>πŸ”“ **Privileges**: **Unauthenticated** access required. No login needed! <br>πŸ“‰ **Impact**: High Integrity & Availability loss. Courses become unusable. πŸ“‰

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. <br>πŸ”‘ **Auth**: **None** required (PR:N). <br>🌐 **Network**: Remote (AV:N). <br>πŸ–±οΈ **UI**: None needed (UI:N). Easy to exploit! πŸš€

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp?**: **No specific PoC** listed in data. <br>πŸ” **Status**: References exist (Wordfence, WP Trac), but no ready-to-use exploit code is provided here. Be cautious! πŸ•΅οΈβ€β™‚οΈ

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **LearnPress** plugin. <br>πŸ“Š **Version**: Check if version ≀ **4.3.2.8**. <br>πŸ› οΈ **Tool**: Use WP vulnerability scanners or check plugin admin panel.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: Yes, implied by version cutoff. <br>πŸ”„ **Action**: Update LearnPress to **latest version** immediately. <br>πŸ“¦ **Vendor**: ThimPress released the fix. Don't wait! πŸƒβ€β™‚οΈ

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the plugin temporarily. <br>πŸ›‘οΈ **Mitigation**: Restrict access to `/wp-admin/` via IP whitelist. <br>πŸ”’ **Backup**: Secure database backups before any changes. Safety first! πŸ›‘οΈ

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. <br>⚑ **Priority**: **Critical**. <br>🚨 **Reason**: Unauthenticated, Remote, High Impact. Fix **NOW** to prevent course data destruction! πŸš‘