<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Data-Deletion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/data-deletion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 02:16:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/data-deletion/feed.xml" rel="self" type="application/rss+xml"/><item><title>LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)</title><link>https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</link><pubDate>Tue, 14 Apr 2026 02:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</guid><description>The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.</description><content:encoded><![CDATA[<p>The LearnPress plugin for WordPress, in versions up to and including 4.3.2.8, is susceptible to unauthorized data deletion. The vulnerability stems from a missing capability check on the <code>delete_question_answer()</code> function. The plugin exposes a <code>wp_rest</code> nonce in public frontend HTML, and this nonce serves as the sole security check for the <code>lp-load-ajax</code> AJAX dispatcher. As the <code>delete_question_answer</code> action lacks capability or ownership validation, unauthenticated attackers can exploit this flaw to delete arbitrary quiz answer options. This is achieved by sending a crafted POST request containing a publicly available nonce. Exploitation does not require any prior authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a LearnPress installation with a vulnerable version (&lt;= 4.3.2.8).</li>
<li>The attacker accesses the public frontend of the WordPress site.</li>
<li>The attacker retrieves the <code>wp_rest</code> nonce from the <code>lpData</code> variable in the HTML source code. This nonce is used for AJAX requests.</li>
<li>The attacker crafts a POST request to the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The crafted POST request includes the <code>action</code> parameter set to <code>delete_question_answer</code>.</li>
<li>The request also includes the <code>nonce</code> parameter with the value of the retrieved <code>wp_rest</code> nonce.</li>
<li>The request includes the <code>answer_id</code> parameter set to the ID of the quiz answer option to be deleted.</li>
<li>The server, lacking proper capability checks, processes the request and deletes the specified quiz answer option from the database. This results in data loss and potentially disrupts the functionality of quizzes within the LearnPress plugin.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows unauthenticated attackers to arbitrarily delete quiz answer options within the LearnPress plugin. This can lead to data loss, disruption of quizzes, and potentially compromise the integrity of educational content. The CVSS v3.1 base score for this vulnerability is 9.1, indicating a critical severity. The number of victims and specific sectors targeted are currently unknown, but any website using the vulnerable LearnPress plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the LearnPress plugin to a version greater than 4.3.2.8 to patch CVE-2026-4365.</li>
<li>Deploy the Sigma rule &ldquo;Detect LearnPress Unauthorized Data Deletion Attempt&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Monitor web server logs for POST requests to <code>wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>delete_question_answer</code> and investigate suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>learnpress</category><category>data-deletion</category><category>unauthorized-access</category></item><item><title>OpenEMR Missing Authorization Allows Unauthorized Data Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-03-openemr-auth-bypass/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openemr-auth-bypass/</guid><description>OpenEMR versions before 8.0.0.3 contain a missing authorization vulnerability in the AJAX deletion endpoint that allows any authenticated user to delete patient data.</description><content:encoded><![CDATA[<p>OpenEMR, a widely used open-source electronic health records and medical practice management application, is vulnerable to a significant authorization bypass. Specifically, versions prior to 8.0.0.3 lack proper authorization checks in the <code>interface/forms/procedure_order/handle_deletions.php</code> AJAX endpoint. This flaw enables any authenticated user, regardless of their assigned role or privileges, to delete procedure orders, patient answers, and specimen records associated with any patient within the OpenEMR system. This vulnerability poses a serious threat to data integrity and confidentiality. The vendor patched this vulnerability in version 8.0.0.3. Defenders should prioritize identifying and patching vulnerable systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials to an OpenEMR instance, potentially through phishing, credential stuffing, or other means.</li>
<li>The attacker logs into the OpenEMR web application with their valid, but potentially low-privilege, account.</li>
<li>The attacker crafts a malicious AJAX request targeting the vulnerable endpoint: <code>interface/forms/procedure_order/handle_deletions.php</code>.</li>
<li>The crafted request specifies the IDs of procedure orders, answers, or specimens that the attacker wishes to delete, regardless of the associated patient.</li>
<li>Due to the missing authorization check, the OpenEMR application processes the deletion request without verifying the attacker&rsquo;s permissions.</li>
<li>The specified patient data (procedure orders, answers, or specimens) is permanently deleted from the OpenEMR database.</li>
<li>The attacker can repeat this process to delete additional patient data, potentially causing significant disruption or data loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The missing authorization vulnerability in OpenEMR allows any authenticated user to delete sensitive patient data, including procedure orders, answers to medical questionnaires, and specimen records. Successful exploitation could lead to data loss, compliance violations (e.g., HIPAA), and disruption of medical practice operations. The precise number of potentially affected OpenEMR instances is unknown, but given the widespread use of OpenEMR in medical practices, the impact could be substantial.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all OpenEMR installations to version 8.0.0.3 or later to remediate CVE-2026-34053.</li>
<li>Implement network monitoring for requests to <code>interface/forms/procedure_order/handle_deletions.php</code> and investigate any unusual activity.</li>
<li>Deploy the Sigma rule to detect potential exploitation attempts by monitoring HTTP requests to the vulnerable endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openemr</category><category>authorization-bypass</category><category>data-deletion</category></item></channel></rss>