
Cloud Vulnerability DB
A community-led vulnerabilities database
A Remote Code Execution (RCE) vulnerability has been identified in VibeThemes WPLMS plugin versions before 1.9.9.5. The vulnerability, tracked as CVE-2024-56051, was discovered by Rafie Muhammad and disclosed on December 17, 2024. This security issue affects the WPLMS plugin for WordPress and allows authenticated users with Student-level privileges or higher to execute arbitrary code on affected systems (Patchstack).
The vulnerability is classified as an Improper Control of Generation of Code (Code Injection) issue, falling under the OWASP Top 10 category A3: Injection. It has been assigned a CVSS v3.1 score of 8.5 (High) with the following vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H. The vulnerability requires Student-level authentication to exploit (NVD, Patchstack).
If successfully exploited, this vulnerability could allow an authenticated attacker to execute arbitrary commands on the target website. This level of access could potentially lead to full control of the affected website, enabling the attacker to establish backdoor access and compromise the entire system (Patchstack).
Users are strongly advised to update to WPLMS plugin version 1.9.9.5 or later immediately to resolve this vulnerability. For users unable to update immediately, Patchstack has issued a virtual patch to mitigate this issue by blocking potential attacks until the update can be applied (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."