Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.5
MasterStudy LMS Plugin for WordPress at Risk of Data Exposure
CVE-2026-4817
Summary
An outdated version of the MasterStudy LMS WordPress Plugin (up to 3.7.25) allows attackers to potentially steal sensitive user information, such as login credentials and session tokens, by manipulating certain parameters in the plugin's API. To protect your data, update the plugin to the latest version as soon as possible. If you can't update immediately, consider restricting access to the affected API endpoint.
Original title
The MasterStudy LMS WordPress Plugin for Online Courses and Education plugin for WordPress is vulnerable to Time-based Blind SQL Injection via the 'order' and 'orderby' parameters in the /lms/stm-l...
Original description
The MasterStudy LMS WordPress Plugin for Online Courses and Education plugin for WordPress is vulnerable to Time-based Blind SQL Injection via the 'order' and 'orderby' parameters in the /lms/stm-lms/order/items REST API endpoint in versions up to and including 3.7.25. This is due to insufficient input sanitization combined with a design flaw in the custom Query builder class that allows unquoted SQL injection in ORDER BY clauses. When the Query builder detects parentheses in the sort_by parameter, it treats the value as a SQL function and directly concatenates it into the ORDER BY clause without any quoting. While esc_sql() is applied to escape quotes and backslashes, this cannot prevent ORDER BY injection when the values themselves are not wrapped in quotes in the resulting SQL statement. This makes it possible for authenticated attackers, with subscriber-level access and above, to append arbitrary SQL queries via the ORDER BY clause to extract sensitive information from the database including user credentials, session tokens, and other confidential data through time-based blind SQL injection techniques.
nvd CVSS3.1
6.5
Vulnerability type
CWE-89
SQL Injection
- https://plugins.trac.wordpress.org/browser/masterstudy-lms-learning-management-s...
- https://plugins.trac.wordpress.org/browser/masterstudy-lms-learning-management-s...
- https://plugins.trac.wordpress.org/browser/masterstudy-lms-learning-management-s...
- https://plugins.trac.wordpress.org/browser/masterstudy-lms-learning-management-s...
- https://plugins.trac.wordpress.org/browser/masterstudy-lms-learning-management-s...
- https://plugins.trac.wordpress.org/browser/masterstudy-lms-learning-management-s...
- https://plugins.trac.wordpress.org/browser/masterstudy-lms-learning-management-s...
- https://plugins.trac.wordpress.org/browser/masterstudy-lms-learning-management-s...
- https://plugins.trac.wordpress.org/changeset/3506029/masterstudy-lms-learning-ma...
- https://plugins.trac.wordpress.org/changeset?old_path=%2Fmasterstudy-lms-learnin...
- https://ti.wordfence.io/vendors/patch/1789/download
- https://www.wordfence.com/threat-intel/vulnerabilities/id/7a51fe96-f3d3-46fe-9e3...
Published: 17 Apr 2026 · Updated: 17 Apr 2026 · First seen: 17 Apr 2026