Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13673: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeum Tutor LMS – eLearning and online course solution

0
High
VulnerabilityCVE-2025-13673cvecve-2025-13673cwe-89
Published: Sat Feb 28 2026 (02/28/2026, 07:25:35 UTC)
Source: CVE Database V5
Vendor/Project: themeum
Product: Tutor LMS – eLearning and online course solution

Description

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. NOTE: This vulnerability was partially mitigated in versions 3.9.4 and 3.9.6.

AI-Powered Analysis

AILast updated: 02/28/2026, 07:55:24 UTC

Technical Analysis

The Tutor LMS plugin for WordPress, widely used for managing eLearning and online courses, suffers from a critical SQL Injection vulnerability identified as CVE-2025-13673. The flaw exists in the handling of the 'coupon_code' parameter, which is insufficiently escaped and improperly prepared in SQL queries. This improper neutralization of special elements (CWE-89) allows unauthenticated attackers to append arbitrary SQL commands to existing queries. Exploiting this vulnerability can lead to unauthorized disclosure of sensitive information stored in the backend database, such as user data, course details, or payment information. The vulnerability affects all versions up to and including 3.9.6, with partial mitigations introduced in versions 3.9.4 and 3.9.6 that do not fully resolve the issue. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates network exploitable, low attack complexity, no privileges or user interaction required, and high confidentiality impact without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability's nature and ease of exploitation make it a significant risk for organizations relying on Tutor LMS for online education.

Potential Impact

The primary impact of this vulnerability is the potential unauthorized disclosure of sensitive information from the Tutor LMS database. Attackers can extract confidential data such as user credentials, personal information, course content, and possibly financial records. This can lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial losses. Since the vulnerability does not affect data integrity or availability, it does not directly enable data modification or service disruption. However, the ease of exploitation without authentication or user interaction increases the risk of widespread attacks, especially on publicly accessible LMS instances. Organizations worldwide using Tutor LMS are at risk of data breaches, which can undermine trust in their eLearning platforms and expose them to legal liabilities.

Mitigation Recommendations

1. Immediate upgrade to a patched version of Tutor LMS once available, as no official patch links are currently provided. 2. Until patches are released, implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'coupon_code' parameter. 3. Employ input validation and sanitization on the 'coupon_code' parameter at the application level to reject unexpected characters or patterns. 4. Restrict database user permissions to the minimum necessary to limit data exposure in case of exploitation. 5. Monitor logs for unusual database query patterns or repeated failed attempts involving the 'coupon_code' parameter. 6. Consider isolating the LMS environment and restricting access to trusted IP ranges to reduce exposure. 7. Conduct security audits and penetration testing focused on SQL injection vectors in the LMS environment. 8. Educate development and security teams about secure coding practices to prevent similar vulnerabilities in custom LMS extensions or integrations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T18:00:47.434Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a29c1732ffcdb8a21a67e8

Added to database: 2/28/2026, 7:41:11 AM

Last enriched: 2/28/2026, 7:55:24 AM

Last updated: 2/28/2026, 9:40:07 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses