<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Learnpress — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/learnpress/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 02:16:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/learnpress/feed.xml" rel="self" type="application/rss+xml"/><item><title>LearnPress WordPress Plugin Unauthorized Data Deletion Vulnerability (CVE-2026-4365)</title><link>https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</link><pubDate>Tue, 14 Apr 2026 02:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-learnpress-data-deletion/</guid><description>The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function, allowing unauthenticated attackers to delete quiz answer options.</description><content:encoded><![CDATA[<p>The LearnPress plugin for WordPress, in versions up to and including 4.3.2.8, is susceptible to unauthorized data deletion. The vulnerability stems from a missing capability check on the <code>delete_question_answer()</code> function. The plugin exposes a <code>wp_rest</code> nonce in public frontend HTML, and this nonce serves as the sole security check for the <code>lp-load-ajax</code> AJAX dispatcher. As the <code>delete_question_answer</code> action lacks capability or ownership validation, unauthenticated attackers can exploit this flaw to delete arbitrary quiz answer options. This is achieved by sending a crafted POST request containing a publicly available nonce. Exploitation does not require any prior authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a LearnPress installation with a vulnerable version (&lt;= 4.3.2.8).</li>
<li>The attacker accesses the public frontend of the WordPress site.</li>
<li>The attacker retrieves the <code>wp_rest</code> nonce from the <code>lpData</code> variable in the HTML source code. This nonce is used for AJAX requests.</li>
<li>The attacker crafts a POST request to the <code>wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The crafted POST request includes the <code>action</code> parameter set to <code>delete_question_answer</code>.</li>
<li>The request also includes the <code>nonce</code> parameter with the value of the retrieved <code>wp_rest</code> nonce.</li>
<li>The request includes the <code>answer_id</code> parameter set to the ID of the quiz answer option to be deleted.</li>
<li>The server, lacking proper capability checks, processes the request and deletes the specified quiz answer option from the database. This results in data loss and potentially disrupts the functionality of quizzes within the LearnPress plugin.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows unauthenticated attackers to arbitrarily delete quiz answer options within the LearnPress plugin. This can lead to data loss, disruption of quizzes, and potentially compromise the integrity of educational content. The CVSS v3.1 base score for this vulnerability is 9.1, indicating a critical severity. The number of victims and specific sectors targeted are currently unknown, but any website using the vulnerable LearnPress plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the LearnPress plugin to a version greater than 4.3.2.8 to patch CVE-2026-4365.</li>
<li>Deploy the Sigma rule &ldquo;Detect LearnPress Unauthorized Data Deletion Attempt&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Monitor web server logs for POST requests to <code>wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>delete_question_answer</code> and investigate suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>learnpress</category><category>data-deletion</category><category>unauthorized-access</category></item></channel></rss>