Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4222: CWE-862 Missing Authorization in themium Tutor LMS Pro

0
High
VulnerabilityCVE-2024-4222cvecve-2024-4222cwe-862
Published: Thu May 16 2024 (05/16/2024, 09:32:11 UTC)
Source: CVE Database V5
Vendor/Project: themium
Product: Tutor LMS Pro

Description

CVE-2024-4222 is a high-severity vulnerability in the Tutor LMS Pro WordPress plugin (up to version 2. 7. 0) caused by missing authorization checks on multiple functions. This flaw allows unauthenticated attackers to add, modify, or delete user metadata and plugin options, potentially leading to data loss and unauthorized data manipulation. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical nature of the affected data make this a significant risk. Organizations using Tutor LMS Pro should prioritize patching or applying mitigations to prevent unauthorized access and maintain data integrity. The vulnerability impacts confidentiality, integrity, and availability of LMS data and settings. Countries with widespread WordPress and Tutor LMS Pro usage, especially those with large e-learning sectors, are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:31:59 UTC

Technical Analysis

CVE-2024-4222 is a vulnerability identified in the Tutor LMS Pro plugin for WordPress, affecting all versions up to and including 2.7.0. The root cause is a missing authorization (CWE-862) on multiple plugin functions, which means that the plugin fails to verify whether a user has the necessary permissions before allowing access to sensitive operations. This flaw enables unauthenticated attackers to remotely invoke these functions to add, modify, or delete user metadata and plugin options without any authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 7.3, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:L/I:L/A:L) of data managed by the plugin. Tutor LMS Pro is widely used in WordPress-based e-learning platforms, making this vulnerability particularly concerning for educational institutions and organizations relying on this plugin for course management. No patches or exploit code are currently publicly available, but the vulnerability is published and recognized by the CVE database. The missing capability checks highlight a critical security design flaw that must be addressed promptly to prevent unauthorized data manipulation and potential service disruption.

Potential Impact

The vulnerability allows unauthenticated attackers to manipulate user metadata and plugin options, which can lead to unauthorized data disclosure, data tampering, and potential loss of data integrity and availability. For organizations, this could mean exposure of sensitive user information, unauthorized changes to LMS configurations, and disruption of e-learning services. Attackers could potentially create or delete user accounts, escalate privileges, or alter course content and settings, undermining trust in the platform. The impact extends to educational institutions, training providers, and enterprises using Tutor LMS Pro for critical learning management functions. Because the vulnerability requires no authentication and can be exploited remotely, the risk of widespread exploitation is significant, especially if attackers develop automated exploit tools. The lack of current known exploits provides a window for mitigation, but also means organizations must act proactively to avoid future attacks.

Mitigation Recommendations

Organizations should immediately upgrade Tutor LMS Pro to a version that addresses this vulnerability once available. Until a patch is released, administrators should restrict access to the WordPress admin area and plugin endpoints using web application firewalls (WAFs) or IP whitelisting to limit exposure. Implement strict role-based access controls and audit user permissions to minimize the impact of any unauthorized changes. Monitor logs for unusual activity related to user metadata or plugin option changes. Disable or remove unused plugins and features to reduce the attack surface. Consider deploying security plugins that can detect and block unauthorized requests targeting plugin functions. Regularly back up LMS data and configurations to enable recovery in case of data loss or tampering. Engage with the plugin vendor for updates and security advisories. Finally, educate administrators about the risks of missing authorization checks and the importance of timely patching.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-26T00:00:13.727Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b84b7ef31ef0b55630b

Added to database: 2/25/2026, 9:37:08 PM

Last enriched: 2/26/2026, 12:31:59 AM

Last updated: 2/26/2026, 8:02:35 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats