PT-2026-31102 · Masteriyo · Masteriyo Lms – Online Course Builder For Elearning

Published

2026-04-08

·

Updated

2026-04-08

·

CVE-2026-5167

CVSS v3.1

5.3

Medium

AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
The Masteriyo LMS – Online Course Builder for eLearning, LMS & Education plugin for WordPress is vulnerable to Authorization Bypass Through User-Controlled Key in versions up to and including 2.1.7. This is due to insufficient webhook signature verification in the handle webhook() function. The webhook endpoint processes unauthenticated requests and only performs signature verification if both the webhook secret setting is configured AND the HTTP STRIPE SIGNATURE header is present. Since webhook secret defaults to an empty string, the webhook processes attacker-controlled JSON payloads without any verification. This makes it possible for unauthenticated attackers to send fake Stripe webhook events with arbitrary order id values in the metadata, mark any order as completed without payment, and gain unauthorized access to paid course content.

Fix

IDOR

Weakness Enumeration

Related Identifiers

CVE-2026-5167

Affected Products

Masteriyo Lms – Online Course Builder For Elearning