Skip to main content

CVE-2022-2563: CWE-79 Cross-Site Scripting (XSS) in Unknown Tutor LMS – eLearning and online course solution

Medium
VulnerabilityCVE-2022-2563cvecve-2022-2563cwe-79
Published: Mon Oct 17 2022 (10/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Tutor LMS – eLearning and online course solution

Description

The Tutor LMS WordPress plugin before 2.0.10 does not escape some course parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 07/06/2025, 18:11:00 UTC

Technical Analysis

CVE-2022-2563 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the Tutor LMS WordPress plugin versions prior to 2.0.10. Tutor LMS is an eLearning and online course solution widely used to create and manage educational content on WordPress sites. The vulnerability arises because certain course parameters are not properly escaped before being stored and rendered. This improper sanitization allows a high-privilege user, such as an administrator, to inject malicious JavaScript code into the plugin's course content. Notably, this XSS can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite WordPress installations to restrict HTML input. The vulnerability requires the attacker to have high privileges (admin-level) and some user interaction (e.g., viewing the malicious content) to trigger the XSS payload. The vulnerability impacts confidentiality and integrity by enabling script execution in the context of the victim's browser, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the LMS or WordPress environment. The CVSS 3.1 base score is 4.8 (medium), reflecting the need for high privileges and user interaction, but the network attack vector and low attack complexity increase the risk. There are no known exploits in the wild as of the publication date, and no official patch links were provided in the source data, but the issue is resolved in version 2.0.10 and later. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation.

Potential Impact

For European organizations using Tutor LMS on WordPress, this vulnerability poses a risk primarily to the integrity and confidentiality of their eLearning platforms. Attackers with admin-level access could inject malicious scripts that execute when other privileged users or instructors access the affected course content. This could lead to session hijacking, unauthorized data access, or manipulation of course materials. Given the educational sector's increasing reliance on online platforms, exploitation could disrupt training programs, leak sensitive student or organizational data, or damage institutional reputation. In multisite WordPress setups common in universities or large educational institutions, the risk is amplified because the vulnerability bypasses the usual 'unfiltered_html' restrictions. Although exploitation requires high privileges, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. Additionally, the potential for cross-site scripting could be used as a pivot point for further attacks within the organization's network. The medium CVSS score suggests moderate urgency, but organizations should prioritize remediation to maintain platform integrity and trust.

Mitigation Recommendations

1. Upgrade Tutor LMS to version 2.0.10 or later immediately, as this version addresses the vulnerability by properly escaping course parameters. 2. Implement strict access controls and monitoring on admin accounts to prevent unauthorized access or misuse of high-privilege credentials. 3. Employ Web Application Firewalls (WAF) with rules tuned to detect and block XSS payloads targeting WordPress plugins, including Tutor LMS. 4. Conduct regular security audits and code reviews of custom LMS content or plugins to ensure no unsanitized inputs are introduced. 5. Educate administrators and content creators about the risks of injecting untrusted HTML or scripts into course content. 6. In multisite WordPress environments, review and tighten capability assignments to minimize the number of users with admin-level privileges. 7. Monitor logs for unusual activity related to course content creation or modification that could indicate exploitation attempts. 8. Consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the LMS environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2022-07-28T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecc68

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 7/6/2025, 6:11:00 PM

Last updated: 8/6/2025, 9:56:00 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats