LifterLMS – WordPress LMS Plugin for eLearning

Information

Software Type Plugin
Software Slug lifterlms (view on wordpress.org)
Software Status Active
Software Author chrisbadgett
Software Website lifterlms.com
Software Downloads 1,336,410
Software Active Installs 10,000
Software Record Last Updated April 13, 2024

7 Vulnerabilities

Title CVE ID CVSS Researchers Date
LifterLMS – WordPress LMS Plugin for eLearning <= 7.5.1 - Missing Authorization via process_review CVE-2024-0377 5.3 Francesco Carlucci February 27, 2024
LifterLMS <= 7.4.2 - Authenticated(Administrator+) Directory Traversal to Arbitrary CSV File Deletion CVE-2023-6160 3.3 Hüseyin TINTAŞ November 5, 2023
LMS by LifterLMS – Online Course, Membership & Learning Management System Plugin for WordPress < 4.21.2 - Insecure Direct Object Reference CVE-2021-24562 7.5 Amirmohammad vakili May 17, 2021
LMS by LifterLMS – Online Course, Membership & Learning Management System Plugin <= 4.21.0 - Stored Cross-Site Scripting CVE-2021-24308 5.4 captain_hook May 10, 2021
LMS by LifterLMS <= 4.21.0 - Reflected Cross-Site Scripting 6.1 Ashish Jha April 29, 2021
LifterLMS Wordpress Plugin <= 3.37.14 - Arbitrary File Write CVE-2020-6008 9.8 Omri Herscovici (Check Point Research), Sagi Tzadik (Check Point Research) March 31, 2020
LMS by LifterLMS <= 3.35.0 - Stored Cross-Site Scripting via Import CVE-2019-15896 9.8 Jerome Bruandet September 9, 2019

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation