Time-based Blind SQL Injection in MasterStudy LMS WordPress Plugin
CVE-2026-4817

6.5MEDIUM

What is CVE-2026-4817?

The MasterStudy LMS WordPress Plugin, utilized for online courses and education, is subject to a Time-based Blind SQL Injection vulnerability through the 'order' and 'orderby' parameters within the /lms/stm-lms/order/items REST API endpoint in versions up to and including 3.7.25. This weakness arises from inadequate sanitization of inputs coupled with flaws in the custom Query builder class, permitting unquoted SQL injections in ORDER BY clauses. When parentheses are included in the sort_by parameter, the Query builder misinterprets the input as a SQL function, appending it directly within the ORDER BY clause without proper quoting. Although esc_sql() is utilized to escape quotes and backslashes, it fails to safeguard against ORDER BY injections where values themselves are unquoted, enabling authenticated attackers with minimal access rights to inject arbitrary SQL commands into the ORDER BY clause. This can lead to the exposure of critical information such as user credentials and session tokens through time-based blind SQL injection techniques.

Affected Version(s)

MasterStudy LMS WordPress Plugin – for Online Courses and Education 0 <= 3.7.25

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Naoya Takahashi
.