CVE-2022-2563: CWE-79 Cross-Site Scripting (XSS) in Unknown Tutor LMS – eLearning and online course solution
The Tutor LMS WordPress plugin before 2.0.10 does not escape some course parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI Analysis
Technical Summary
CVE-2022-2563 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the Tutor LMS WordPress plugin versions prior to 2.0.10. Tutor LMS is an eLearning and online course solution widely used to create and manage educational content on WordPress sites. The vulnerability arises because certain course parameters are not properly escaped before being stored and rendered. This improper sanitization allows a high-privilege user, such as an administrator, to inject malicious JavaScript code into the plugin's course content. Notably, this XSS can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite WordPress installations to restrict HTML input. The vulnerability requires the attacker to have high privileges (admin-level) and some user interaction (e.g., viewing the malicious content) to trigger the XSS payload. The vulnerability impacts confidentiality and integrity by enabling script execution in the context of the victim's browser, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the LMS or WordPress environment. The CVSS 3.1 base score is 4.8 (medium), reflecting the need for high privileges and user interaction, but the network attack vector and low attack complexity increase the risk. There are no known exploits in the wild as of the publication date, and no official patch links were provided in the source data, but the issue is resolved in version 2.0.10 and later. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation.
Potential Impact
For European organizations using Tutor LMS on WordPress, this vulnerability poses a risk primarily to the integrity and confidentiality of their eLearning platforms. Attackers with admin-level access could inject malicious scripts that execute when other privileged users or instructors access the affected course content. This could lead to session hijacking, unauthorized data access, or manipulation of course materials. Given the educational sector's increasing reliance on online platforms, exploitation could disrupt training programs, leak sensitive student or organizational data, or damage institutional reputation. In multisite WordPress setups common in universities or large educational institutions, the risk is amplified because the vulnerability bypasses the usual 'unfiltered_html' restrictions. Although exploitation requires high privileges, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. Additionally, the potential for cross-site scripting could be used as a pivot point for further attacks within the organization's network. The medium CVSS score suggests moderate urgency, but organizations should prioritize remediation to maintain platform integrity and trust.
Mitigation Recommendations
1. Upgrade Tutor LMS to version 2.0.10 or later immediately, as this version addresses the vulnerability by properly escaping course parameters. 2. Implement strict access controls and monitoring on admin accounts to prevent unauthorized access or misuse of high-privilege credentials. 3. Employ Web Application Firewalls (WAF) with rules tuned to detect and block XSS payloads targeting WordPress plugins, including Tutor LMS. 4. Conduct regular security audits and code reviews of custom LMS content or plugins to ensure no unsanitized inputs are introduced. 5. Educate administrators and content creators about the risks of injecting untrusted HTML or scripts into course content. 6. In multisite WordPress environments, review and tighten capability assignments to minimize the number of users with admin-level privileges. 7. Monitor logs for unusual activity related to course content creation or modification that could indicate exploitation attempts. 8. Consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the LMS environment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2022-2563: CWE-79 Cross-Site Scripting (XSS) in Unknown Tutor LMS – eLearning and online course solution
Description
The Tutor LMS WordPress plugin before 2.0.10 does not escape some course parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI-Powered Analysis
Technical Analysis
CVE-2022-2563 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the Tutor LMS WordPress plugin versions prior to 2.0.10. Tutor LMS is an eLearning and online course solution widely used to create and manage educational content on WordPress sites. The vulnerability arises because certain course parameters are not properly escaped before being stored and rendered. This improper sanitization allows a high-privilege user, such as an administrator, to inject malicious JavaScript code into the plugin's course content. Notably, this XSS can be exploited even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite WordPress installations to restrict HTML input. The vulnerability requires the attacker to have high privileges (admin-level) and some user interaction (e.g., viewing the malicious content) to trigger the XSS payload. The vulnerability impacts confidentiality and integrity by enabling script execution in the context of the victim's browser, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the LMS or WordPress environment. The CVSS 3.1 base score is 4.8 (medium), reflecting the need for high privileges and user interaction, but the network attack vector and low attack complexity increase the risk. There are no known exploits in the wild as of the publication date, and no official patch links were provided in the source data, but the issue is resolved in version 2.0.10 and later. This vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation.
Potential Impact
For European organizations using Tutor LMS on WordPress, this vulnerability poses a risk primarily to the integrity and confidentiality of their eLearning platforms. Attackers with admin-level access could inject malicious scripts that execute when other privileged users or instructors access the affected course content. This could lead to session hijacking, unauthorized data access, or manipulation of course materials. Given the educational sector's increasing reliance on online platforms, exploitation could disrupt training programs, leak sensitive student or organizational data, or damage institutional reputation. In multisite WordPress setups common in universities or large educational institutions, the risk is amplified because the vulnerability bypasses the usual 'unfiltered_html' restrictions. Although exploitation requires high privileges, insider threats or compromised admin accounts could leverage this vulnerability to escalate attacks. Additionally, the potential for cross-site scripting could be used as a pivot point for further attacks within the organization's network. The medium CVSS score suggests moderate urgency, but organizations should prioritize remediation to maintain platform integrity and trust.
Mitigation Recommendations
1. Upgrade Tutor LMS to version 2.0.10 or later immediately, as this version addresses the vulnerability by properly escaping course parameters. 2. Implement strict access controls and monitoring on admin accounts to prevent unauthorized access or misuse of high-privilege credentials. 3. Employ Web Application Firewalls (WAF) with rules tuned to detect and block XSS payloads targeting WordPress plugins, including Tutor LMS. 4. Conduct regular security audits and code reviews of custom LMS content or plugins to ensure no unsanitized inputs are introduced. 5. Educate administrators and content creators about the risks of injecting untrusted HTML or scripts into course content. 6. In multisite WordPress environments, review and tighten capability assignments to minimize the number of users with admin-level privileges. 7. Monitor logs for unusual activity related to course content creation or modification that could indicate exploitation attempts. 8. Consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the LMS environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2022-07-28T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecc68
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 6:11:00 PM
Last updated: 8/6/2025, 9:56:00 PM
Views: 14
Related Threats
CVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumCVE-2025-8720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Plugin README Parser
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.