Arbitrary File Inclusion Vulnerability in MasterStudy LMS Plugin for WordPress
CVE-2024-2411

9.8CRITICAL

Key Information:

Summary

The MasterStudy LMS plugin for WordPress, developed by Stylemix Themes, is susceptible to a Local File Inclusion vulnerability that affects all versions up to and including 3.3.0. This issue arises through the 'modal' parameter, permitting unauthenticated attackers to include and execute arbitrary files on the server. The exploit allows for the execution of any PHP code contained within those files, posing a serious risk of bypassing access controls. Consequently, this vulnerability may lead to unauthorized access to sensitive data and potentially facilitate broader code execution attacks, exploiting scenarios where 'safe' file types like images can be uploaded and included.

Affected Version(s)

MasterStudy LMS WordPress Plugin – for Online Courses and Education * <= 3.3.0

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Hiroho Shimada
.