CVE-2026-7648
MEDIUM
4,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none
Description
AI Translation Available
The LearnPress – WordPress LMS Plugin for Create and Sell Online Courses plugin for WordPress is vulnerable to payment bypass through user-controlled key in all versions up to, and including, 4.3.5. This is due to improper handling of user-supplied request parameters in the REST API endpoint, which passes the unsanitized parameter array to the add_to_cart() function where array_merge() allows attacker-controlled values to overwrite hardcoded defaults. This makes it possible for authenticated attackers, with subscriber-level access and above, to enroll in any paid course entirely free of charge by supplying a quantity value of zero, which causes the order total to calculate as $0 and bypasses all payment gateway requirements.
639
Authorization Bypass Through User-Controlled Key
IncompleteCommon Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
https://plugins.trac.wordpress.org/browser/learnpress/tags/4.3.3/inc/cart/class…
https://plugins.trac.wordpress.org/browser/learnpress/tags/4.3.3/inc/cart/class…
https://plugins.trac.wordpress.org/browser/learnpress/tags/4.3.3/inc/rest-api/v…
https://plugins.trac.wordpress.org/browser/learnpress/trunk/inc/cart/class-lp-c…
https://plugins.trac.wordpress.org/browser/learnpress/trunk/inc/cart/class-lp-c…
https://plugins.trac.wordpress.org/browser/learnpress/trunk/inc/rest-api/v1/fro…
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&ol…
https://www.wordfence.com/threat-intel/vulnerabilities/id/564ec4a6-20d3-4b46-86…