CVE-2025-13673: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeum Tutor LMS – eLearning and online course solution
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. NOTE: This vulnerability was partially mitigated in versions 3.9.4 and 3.9.6.
AI Analysis
Technical Summary
The Tutor LMS plugin for WordPress, widely used for managing eLearning and online courses, suffers from a critical SQL Injection vulnerability identified as CVE-2025-13673. The flaw exists in the handling of the 'coupon_code' parameter, which is insufficiently escaped and improperly prepared in SQL queries. This improper neutralization of special elements (CWE-89) allows unauthenticated attackers to append arbitrary SQL commands to existing queries. Exploiting this vulnerability can lead to unauthorized disclosure of sensitive information stored in the backend database, such as user data, course details, or payment information. The vulnerability affects all versions up to and including 3.9.6, with partial mitigations introduced in versions 3.9.4 and 3.9.6 that do not fully resolve the issue. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates network exploitable, low attack complexity, no privileges or user interaction required, and high confidentiality impact without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a significant risk for organizations relying on Tutor LMS for online education.
Potential Impact
The primary impact of this vulnerability is the potential unauthorized disclosure of sensitive information from the Tutor LMS database. Attackers can extract confidential data such as user credentials, personal information, course content, and possibly financial records. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial losses. Since the vulnerability does not affect data integrity or availability, it does not directly enable data modification or service disruption. However, the ease of exploitation without authentication or user interaction increases the risk of widespread attacks, especially on publicly accessible LMS instances. Organizations worldwide using Tutor LMS are at risk of data breaches, which can undermine trust in their eLearning platforms and expose them to legal liabilities.
Mitigation Recommendations
1. Immediate upgrade to a patched version of Tutor LMS once available, as no official patch links are currently provided. 2. Until patches are released, implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'coupon_code' parameter. 3. Employ input validation and sanitization on the 'coupon_code' parameter at the application level to reject unexpected characters or patterns. 4. Restrict database user permissions to the minimum necessary to limit data exposure in case of exploitation. 5. Monitor logs for unusual database query patterns or repeated failed attempts involving the 'coupon_code' parameter. 6. Consider isolating the LMS environment and restricting access to trusted IP ranges to reduce exposure. 7. Conduct security audits and penetration testing focused on SQL injection vectors in the LMS environment. 8. Educate development and security teams about secure coding practices to prevent similar vulnerabilities in custom LMS extensions or integrations.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Japan, South Korea
CVE-2025-13673: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeum Tutor LMS – eLearning and online course solution
Description
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. NOTE: This vulnerability was partially mitigated in versions 3.9.4 and 3.9.6.
AI-Powered Analysis
Technical Analysis
The Tutor LMS plugin for WordPress, widely used for managing eLearning and online courses, suffers from a critical SQL Injection vulnerability identified as CVE-2025-13673. The flaw exists in the handling of the 'coupon_code' parameter, which is insufficiently escaped and improperly prepared in SQL queries. This improper neutralization of special elements (CWE-89) allows unauthenticated attackers to append arbitrary SQL commands to existing queries. Exploiting this vulnerability can lead to unauthorized disclosure of sensitive information stored in the backend database, such as user data, course details, or payment information. The vulnerability affects all versions up to and including 3.9.6, with partial mitigations introduced in versions 3.9.4 and 3.9.6 that do not fully resolve the issue. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates network exploitable, low attack complexity, no privileges or user interaction required, and high confidentiality impact without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a significant risk for organizations relying on Tutor LMS for online education.
Potential Impact
The primary impact of this vulnerability is the potential unauthorized disclosure of sensitive information from the Tutor LMS database. Attackers can extract confidential data such as user credentials, personal information, course content, and possibly financial records. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial losses. Since the vulnerability does not affect data integrity or availability, it does not directly enable data modification or service disruption. However, the ease of exploitation without authentication or user interaction increases the risk of widespread attacks, especially on publicly accessible LMS instances. Organizations worldwide using Tutor LMS are at risk of data breaches, which can undermine trust in their eLearning platforms and expose them to legal liabilities.
Mitigation Recommendations
1. Immediate upgrade to a patched version of Tutor LMS once available, as no official patch links are currently provided. 2. Until patches are released, implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'coupon_code' parameter. 3. Employ input validation and sanitization on the 'coupon_code' parameter at the application level to reject unexpected characters or patterns. 4. Restrict database user permissions to the minimum necessary to limit data exposure in case of exploitation. 5. Monitor logs for unusual database query patterns or repeated failed attempts involving the 'coupon_code' parameter. 6. Consider isolating the LMS environment and restricting access to trusted IP ranges to reduce exposure. 7. Conduct security audits and penetration testing focused on SQL injection vectors in the LMS environment. 8. Educate development and security teams about secure coding practices to prevent similar vulnerabilities in custom LMS extensions or integrations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-25T18:00:47.434Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a29c1732ffcdb8a21a67e8
Added to database: 2/28/2026, 7:41:11 AM
Last enriched: 2/28/2026, 7:55:24 AM
Last updated: 2/28/2026, 9:40:07 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3010: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Microchip TimePictra
CriticalCVE-2026-2844: CWE-306 Missing Authentication for Critical Function in Microchip TimePictra
CriticalCVE-2026-1542: CWE-502 Deserialization of Untrusted Data in Super Stage WP
UnknownCVE-2026-2471: CWE-502 Deserialization of Untrusted Data in smub WP Mail Logging
HighCVE-2024-29741: Elevation of privilege in Google Android
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.