CVE-2023-4805: CWE-79 Cross-Site Scripting (XSS) in Unknown Tutor LMS
The Tutor LMS WordPress plugin before 2.3.0 does not sanitise and escape some of its settings, which could allow users such as subscriber to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI Analysis
Technical Summary
CVE-2023-4805 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Tutor LMS WordPress plugin versions prior to 2.3.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with relatively low privileges, such as subscribers, to inject malicious JavaScript code into the plugin's stored settings. Notably, this exploitation is possible even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite WordPress installations. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score of 5.4 reflects a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (low), and user interaction (required). The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, with no impact on availability. Although no known exploits are reported in the wild, the vulnerability could allow an attacker to execute arbitrary JavaScript in the context of other users, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the LMS environment. Since Tutor LMS is a widely used WordPress plugin for managing online courses, exploitation could affect educational institutions, corporate training platforms, and other organizations relying on this plugin for e-learning services.
Potential Impact
For European organizations, the impact of CVE-2023-4805 can be significant, especially for entities relying on Tutor LMS for educational or training purposes. Successful exploitation could lead to unauthorized access to user sessions, theft of sensitive information such as personal data or credentials, and manipulation of course content or user progress data. This undermines the integrity and confidentiality of the LMS platform and could damage organizational reputation and compliance with data protection regulations like GDPR. Additionally, attackers could leverage the XSS vulnerability to deliver further attacks such as phishing or malware distribution within the LMS user base. The risk is heightened in multisite WordPress deployments common in universities and large enterprises, where the vulnerability bypasses typical restrictions on HTML content. Although availability is not directly impacted, the indirect consequences of data breaches or loss of trust could disrupt educational services and require costly incident response and remediation efforts.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Tutor LMS plugin to version 2.3.0 or later, where the issue is resolved through proper input sanitization and escaping. If immediate patching is not feasible, administrators should restrict the ability to modify plugin settings to trusted users only, minimizing the risk of malicious input. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting Tutor LMS settings can provide additional protection. Regularly auditing user roles and permissions within WordPress multisite environments is critical to ensure that low-privilege users cannot escalate their capabilities or inject harmful content. Monitoring logs for unusual activity related to plugin settings changes or unexpected script execution can help detect exploitation attempts early. Finally, educating users about the risks of XSS and encouraging cautious behavior when interacting with LMS content can reduce the likelihood of successful social engineering attacks leveraging this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2023-4805: CWE-79 Cross-Site Scripting (XSS) in Unknown Tutor LMS
Description
The Tutor LMS WordPress plugin before 2.3.0 does not sanitise and escape some of its settings, which could allow users such as subscriber to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
AI-Powered Analysis
Technical Analysis
CVE-2023-4805 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Tutor LMS WordPress plugin versions prior to 2.3.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with relatively low privileges, such as subscribers, to inject malicious JavaScript code into the plugin's stored settings. Notably, this exploitation is possible even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite WordPress installations. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score of 5.4 reflects a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (low), and user interaction (required). The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, with no impact on availability. Although no known exploits are reported in the wild, the vulnerability could allow an attacker to execute arbitrary JavaScript in the context of other users, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the LMS environment. Since Tutor LMS is a widely used WordPress plugin for managing online courses, exploitation could affect educational institutions, corporate training platforms, and other organizations relying on this plugin for e-learning services.
Potential Impact
For European organizations, the impact of CVE-2023-4805 can be significant, especially for entities relying on Tutor LMS for educational or training purposes. Successful exploitation could lead to unauthorized access to user sessions, theft of sensitive information such as personal data or credentials, and manipulation of course content or user progress data. This undermines the integrity and confidentiality of the LMS platform and could damage organizational reputation and compliance with data protection regulations like GDPR. Additionally, attackers could leverage the XSS vulnerability to deliver further attacks such as phishing or malware distribution within the LMS user base. The risk is heightened in multisite WordPress deployments common in universities and large enterprises, where the vulnerability bypasses typical restrictions on HTML content. Although availability is not directly impacted, the indirect consequences of data breaches or loss of trust could disrupt educational services and require costly incident response and remediation efforts.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Tutor LMS plugin to version 2.3.0 or later, where the issue is resolved through proper input sanitization and escaping. If immediate patching is not feasible, administrators should restrict the ability to modify plugin settings to trusted users only, minimizing the risk of malicious input. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting Tutor LMS settings can provide additional protection. Regularly auditing user roles and permissions within WordPress multisite environments is critical to ensure that low-privilege users cannot escalate their capabilities or inject harmful content. Monitoring logs for unusual activity related to plugin settings changes or unexpected script execution can help detect exploitation attempts early. Finally, educating users about the risks of XSS and encouraging cautious behavior when interacting with LMS content can reduce the likelihood of successful social engineering attacks leveraging this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-09-06T16:20:45.716Z
- Cisa Enriched
- true
Threat ID: 682d9847c4522896dcbf5324
Added to database: 5/21/2025, 9:09:27 AM
Last enriched: 6/22/2025, 9:36:25 AM
Last updated: 12/4/2025, 9:12:39 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.