CVE-2025-13628: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized modification and deletion of data due to a missing capability check on the 'bulk_action_handler' and 'coupon_permanent_delete' functions in all versions up to, and including, 3.9.3. This makes it possible for authenticated attackers, with subscriber level access and above, to delete, activate, deactivate, or trash arbitrary coupons.
AI Analysis
Technical Summary
CVE-2025-13628 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Tutor LMS plugin for WordPress, a popular e-learning and online course solution. The issue arises because the plugin's 'bulk_action_handler' and 'coupon_permanent_delete' functions lack proper capability checks, allowing authenticated users with minimal privileges (subscriber level and above) to perform unauthorized actions on coupons. These actions include deleting, activating, deactivating, or trashing coupons arbitrarily. Since the vulnerability requires only authenticated access and no user interaction, an attacker who can log in with a subscriber account can exploit this flaw remotely. The CVSS v3.1 score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a clear impact on integrity. The vulnerability affects all versions up to 3.9.3 of Tutor LMS, with no patches currently linked or known exploits reported in the wild. The flaw could be leveraged to disrupt promotional campaigns, cause financial losses, or undermine trust in e-learning platforms by manipulating coupon codes. The root cause is the absence of authorization checks to verify if the user has the necessary permissions to perform coupon management operations, violating secure coding best practices for access control.
Potential Impact
For European organizations using Tutor LMS, this vulnerability poses a risk primarily to the integrity of their e-learning platform's promotional mechanisms. Unauthorized coupon deletion or activation could lead to financial losses due to misuse of discounts or invalidation of legitimate offers. It could also damage the organization's reputation if customers experience inconsistent or unfair coupon behavior. Since the vulnerability requires only subscriber-level authentication, attackers could exploit compromised or weak user accounts to manipulate coupons. Although the vulnerability does not directly affect confidentiality or availability, the integrity compromise could indirectly impact business operations and customer trust. Educational institutions, training providers, and corporate e-learning platforms in Europe that rely on Tutor LMS are at risk. The lack of known exploits in the wild suggests limited current exploitation, but the ease of exploitation and the widespread use of WordPress-based LMS solutions in Europe warrant proactive mitigation.
Mitigation Recommendations
1. Upgrade Tutor LMS to the latest version once a patch addressing CVE-2025-13628 is released by the vendor. 2. Until an official patch is available, implement custom capability checks by modifying the plugin code or using WordPress hooks to restrict coupon management functions to trusted roles only (e.g., administrators). 3. Restrict subscriber-level users from accessing coupon management features by adjusting role permissions or using role management plugins. 4. Monitor logs and audit coupon-related activities regularly to detect unauthorized modifications. 5. Enforce strong authentication policies, including multi-factor authentication, to reduce the risk of account compromise. 6. Educate users about phishing and credential hygiene to prevent attackers from gaining subscriber-level access. 7. Consider isolating the LMS environment or limiting network access to trusted users to reduce exposure. 8. Backup coupon data regularly to enable recovery from unauthorized deletions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13628: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
Description
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized modification and deletion of data due to a missing capability check on the 'bulk_action_handler' and 'coupon_permanent_delete' functions in all versions up to, and including, 3.9.3. This makes it possible for authenticated attackers, with subscriber level access and above, to delete, activate, deactivate, or trash arbitrary coupons.
AI-Powered Analysis
Technical Analysis
CVE-2025-13628 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Tutor LMS plugin for WordPress, a popular e-learning and online course solution. The issue arises because the plugin's 'bulk_action_handler' and 'coupon_permanent_delete' functions lack proper capability checks, allowing authenticated users with minimal privileges (subscriber level and above) to perform unauthorized actions on coupons. These actions include deleting, activating, deactivating, or trashing coupons arbitrarily. Since the vulnerability requires only authenticated access and no user interaction, an attacker who can log in with a subscriber account can exploit this flaw remotely. The CVSS v3.1 score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a clear impact on integrity. The vulnerability affects all versions up to 3.9.3 of Tutor LMS, with no patches currently linked or known exploits reported in the wild. The flaw could be leveraged to disrupt promotional campaigns, cause financial losses, or undermine trust in e-learning platforms by manipulating coupon codes. The root cause is the absence of authorization checks to verify if the user has the necessary permissions to perform coupon management operations, violating secure coding best practices for access control.
Potential Impact
For European organizations using Tutor LMS, this vulnerability poses a risk primarily to the integrity of their e-learning platform's promotional mechanisms. Unauthorized coupon deletion or activation could lead to financial losses due to misuse of discounts or invalidation of legitimate offers. It could also damage the organization's reputation if customers experience inconsistent or unfair coupon behavior. Since the vulnerability requires only subscriber-level authentication, attackers could exploit compromised or weak user accounts to manipulate coupons. Although the vulnerability does not directly affect confidentiality or availability, the integrity compromise could indirectly impact business operations and customer trust. Educational institutions, training providers, and corporate e-learning platforms in Europe that rely on Tutor LMS are at risk. The lack of known exploits in the wild suggests limited current exploitation, but the ease of exploitation and the widespread use of WordPress-based LMS solutions in Europe warrant proactive mitigation.
Mitigation Recommendations
1. Upgrade Tutor LMS to the latest version once a patch addressing CVE-2025-13628 is released by the vendor. 2. Until an official patch is available, implement custom capability checks by modifying the plugin code or using WordPress hooks to restrict coupon management functions to trusted roles only (e.g., administrators). 3. Restrict subscriber-level users from accessing coupon management features by adjusting role permissions or using role management plugins. 4. Monitor logs and audit coupon-related activities regularly to detect unauthorized modifications. 5. Enforce strong authentication policies, including multi-factor authentication, to reduce the risk of account compromise. 6. Educate users about phishing and credential hygiene to prevent attackers from gaining subscriber-level access. 7. Consider isolating the LMS environment or limiting network access to trusted users to reduce exposure. 8. Backup coupon data regularly to enable recovery from unauthorized deletions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-24T21:38:45.491Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960b130ecefc3cd7c0f7cf3
Added to database: 1/9/2026, 7:41:36 AM
Last enriched: 1/9/2026, 7:59:03 AM
Last updated: 1/10/2026, 10:15:22 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.