Skip to main content

CVE-2023-4805: CWE-79 Cross-Site Scripting (XSS) in Unknown Tutor LMS

Medium
Published: Mon Oct 16 2023 (10/16/2023, 19:39:06 UTC)
Source: CVE
Vendor/Project: Unknown
Product: Tutor LMS

Description

The Tutor LMS WordPress plugin before 2.3.0 does not sanitise and escape some of its settings, which could allow users such as subscriber to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

AI-Powered Analysis

AILast updated: 06/22/2025, 09:36:25 UTC

Technical Analysis

CVE-2023-4805 is a Stored Cross-Site Scripting (XSS) vulnerability identified in the Tutor LMS WordPress plugin versions prior to 2.3.0. The vulnerability arises because the plugin fails to properly sanitize and escape certain settings inputs. This flaw allows users with relatively low privileges, such as subscribers, to inject malicious JavaScript code into the plugin's stored settings. Notably, this exploitation is possible even when the WordPress capability 'unfiltered_html' is disabled, which is often the case in multisite WordPress installations. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. The CVSS 3.1 base score of 5.4 reflects a medium severity level, with an attack vector of network (remote exploitation), low attack complexity, requiring privileges (low), and user interaction (required). The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality and integrity loss, with no impact on availability. Although no known exploits are reported in the wild, the vulnerability could allow an attacker to execute arbitrary JavaScript in the context of other users, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the LMS environment. Since Tutor LMS is a widely used WordPress plugin for managing online courses, exploitation could affect educational institutions, corporate training platforms, and other organizations relying on this plugin for e-learning services.

Potential Impact

For European organizations, the impact of CVE-2023-4805 can be significant, especially for entities relying on Tutor LMS for educational or training purposes. Successful exploitation could lead to unauthorized access to user sessions, theft of sensitive information such as personal data or credentials, and manipulation of course content or user progress data. This undermines the integrity and confidentiality of the LMS platform and could damage organizational reputation and compliance with data protection regulations like GDPR. Additionally, attackers could leverage the XSS vulnerability to deliver further attacks such as phishing or malware distribution within the LMS user base. The risk is heightened in multisite WordPress deployments common in universities and large enterprises, where the vulnerability bypasses typical restrictions on HTML content. Although availability is not directly impacted, the indirect consequences of data breaches or loss of trust could disrupt educational services and require costly incident response and remediation efforts.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Tutor LMS plugin to version 2.3.0 or later, where the issue is resolved through proper input sanitization and escaping. If immediate patching is not feasible, administrators should restrict the ability to modify plugin settings to trusted users only, minimizing the risk of malicious input. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious script injections targeting Tutor LMS settings can provide additional protection. Regularly auditing user roles and permissions within WordPress multisite environments is critical to ensure that low-privilege users cannot escalate their capabilities or inject harmful content. Monitoring logs for unusual activity related to plugin settings changes or unexpected script execution can help detect exploitation attempts early. Finally, educating users about the risks of XSS and encouraging cautious behavior when interacting with LMS content can reduce the likelihood of successful social engineering attacks leveraging this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-09-06T16:20:45.716Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf5324

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/22/2025, 9:36:25 AM

Last updated: 8/11/2025, 9:07:25 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats