<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>WP Learn Manager — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/wp-learn-manager/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:21:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/wp-learn-manager/feed.xml" rel="self" type="application/rss+xml"/><item><title>WP Learn Manager Stored XSS Vulnerability (CVE-2021-47975)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47975-xss/</link><pubDate>Sat, 16 May 2026 16:21:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47975-xss/</guid><description>WP Learn Manager 1.1.2 contains a stored cross-site scripting vulnerability (CVE-2021-47975) that allows unauthenticated attackers to inject malicious scripts through the fieldtitle parameter via a POST request to the jslm_fieldordering page, resulting in arbitrary JavaScript execution when administrators view the field ordering interface.</description><content:encoded><![CDATA[<p>WP Learn Manager version 1.1.2 is susceptible to a stored cross-site scripting (XSS) vulnerability, identified as CVE-2021-47975. This flaw allows unauthenticated attackers to inject malicious JavaScript code into the application. The vulnerability is triggered when an attacker sends a crafted POST request to the <code>jslm_fieldordering</code> page, embedding the XSS payload within the <code>fieldtitle</code> parameter. When an administrator accesses the field ordering interface, the injected script is executed within their browser session. This vulnerability could allow attackers to compromise administrator accounts, deface the website, or redirect users to malicious sites.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious POST request targeting the <code>jslm_fieldordering</code> page.</li>
<li>The attacker includes a JavaScript payload within the <code>fieldtitle</code> parameter of the POST request, designed to execute arbitrary code in the administrator&rsquo;s browser.</li>
<li>The attacker sends the crafted POST request to the vulnerable <code>jslm_fieldordering</code> endpoint.</li>
<li>The WP Learn Manager application stores the malicious payload in its database without proper sanitization or encoding.</li>
<li>An administrator logs into the WP Learn Manager administrative interface.</li>
<li>The administrator navigates to the field ordering interface, which retrieves the stored, malicious <code>fieldtitle</code> value from the database.</li>
<li>The application renders the page, injecting the stored JavaScript payload into the administrator&rsquo;s browser.</li>
<li>The administrator&rsquo;s browser executes the malicious JavaScript code, potentially leading to account compromise or further malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this XSS vulnerability (CVE-2021-47975) allows unauthenticated attackers to inject arbitrary JavaScript code into the WP Learn Manager application. This can lead to the compromise of administrator accounts, allowing the attacker to gain full control over the website. Other impacts include website defacement, redirection of users to malicious sites, or theft of sensitive information. The CVSS v3.1 base score for this vulnerability is 7.2, indicating a high level of potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect CVE-2021-47975 Exploitation — WP Learn Manager XSS via fieldtitle Parameter</code> to detect exploitation attempts in web server logs.</li>
<li>Inspect web server logs for POST requests to the <code>jslm_fieldordering</code> endpoint containing suspicious characters or JavaScript code within the <code>fieldtitle</code> parameter, as highlighted by the <code>cs-uri-query|contains</code> field in the Sigma rule.</li>
<li>Upgrade WP Learn Manager to a patched version that addresses CVE-2021-47975.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>cve</category><category>xss</category><category>web</category><category>wordpress</category></item></channel></rss>