Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13628: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution

0
Medium
VulnerabilityCVE-2025-13628cvecve-2025-13628cwe-862
Published: Fri Jan 09 2026 (01/09/2026, 07:22:10 UTC)
Source: CVE Database V5
Vendor/Project: themeum
Product: Tutor LMS – eLearning and online course solution

Description

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized modification and deletion of data due to a missing capability check on the 'bulk_action_handler' and 'coupon_permanent_delete' functions in all versions up to, and including, 3.9.3. This makes it possible for authenticated attackers, with subscriber level access and above, to delete, activate, deactivate, or trash arbitrary coupons.

AI-Powered Analysis

AILast updated: 01/09/2026, 07:59:03 UTC

Technical Analysis

CVE-2025-13628 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Tutor LMS plugin for WordPress, a popular e-learning and online course solution. The issue arises because the plugin's 'bulk_action_handler' and 'coupon_permanent_delete' functions lack proper capability checks, allowing authenticated users with minimal privileges (subscriber level and above) to perform unauthorized actions on coupons. These actions include deleting, activating, deactivating, or trashing coupons arbitrarily. Since the vulnerability requires only authenticated access and no user interaction, an attacker who can log in with a subscriber account can exploit this flaw remotely. The CVSS v3.1 score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a clear impact on integrity. The vulnerability affects all versions up to 3.9.3 of Tutor LMS, with no patches currently linked or known exploits reported in the wild. The flaw could be leveraged to disrupt promotional campaigns, cause financial losses, or undermine trust in e-learning platforms by manipulating coupon codes. The root cause is the absence of authorization checks to verify if the user has the necessary permissions to perform coupon management operations, violating secure coding best practices for access control.

Potential Impact

For European organizations using Tutor LMS, this vulnerability poses a risk primarily to the integrity of their e-learning platform's promotional mechanisms. Unauthorized coupon deletion or activation could lead to financial losses due to misuse of discounts or invalidation of legitimate offers. It could also damage the organization's reputation if customers experience inconsistent or unfair coupon behavior. Since the vulnerability requires only subscriber-level authentication, attackers could exploit compromised or weak user accounts to manipulate coupons. Although the vulnerability does not directly affect confidentiality or availability, the integrity compromise could indirectly impact business operations and customer trust. Educational institutions, training providers, and corporate e-learning platforms in Europe that rely on Tutor LMS are at risk. The lack of known exploits in the wild suggests limited current exploitation, but the ease of exploitation and the widespread use of WordPress-based LMS solutions in Europe warrant proactive mitigation.

Mitigation Recommendations

1. Upgrade Tutor LMS to the latest version once a patch addressing CVE-2025-13628 is released by the vendor. 2. Until an official patch is available, implement custom capability checks by modifying the plugin code or using WordPress hooks to restrict coupon management functions to trusted roles only (e.g., administrators). 3. Restrict subscriber-level users from accessing coupon management features by adjusting role permissions or using role management plugins. 4. Monitor logs and audit coupon-related activities regularly to detect unauthorized modifications. 5. Enforce strong authentication policies, including multi-factor authentication, to reduce the risk of account compromise. 6. Educate users about phishing and credential hygiene to prevent attackers from gaining subscriber-level access. 7. Consider isolating the LMS environment or limiting network access to trusted users to reduce exposure. 8. Backup coupon data regularly to enable recovery from unauthorized deletions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-24T21:38:45.491Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960b130ecefc3cd7c0f7cf3

Added to database: 1/9/2026, 7:41:36 AM

Last enriched: 1/9/2026, 7:59:03 AM

Last updated: 1/10/2026, 10:15:22 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats