CVE-2025-13934: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized course enrollment in all versions up to, and including, 3.9.3. This is due to a missing capability check and purchasability validation in the `course_enrollment()` AJAX handler. This makes it possible for authenticated attackers, with subscriber level access and above, to enroll themselves in any course without going through the proper purchase flow.
AI Analysis
Technical Summary
CVE-2025-13934 is a missing authorization vulnerability (CWE-862) in the Tutor LMS plugin for WordPress, a widely used eLearning and online course management solution. The flaw exists in the `course_enrollment()` AJAX handler, which lacks proper capability checks and purchasability validation. This allows any authenticated user with subscriber-level privileges or higher to bypass the purchase flow and enroll themselves in any course. The vulnerability affects all versions up to 3.9.3 inclusive. The attack vector is remote and requires only low privileges (subscriber access), with no user interaction needed beyond authentication. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but a clear integrity impact due to unauthorized course enrollment. There are no known exploits in the wild, and no patches have been officially released at the time of reporting. The vulnerability can lead to unauthorized access to paid course content, undermining revenue models and potentially exposing course materials to unauthorized users. Given the plugin’s popularity in WordPress-based eLearning platforms, this vulnerability poses a risk to educational institutions and commercial course providers using Tutor LMS.
Potential Impact
For European organizations, especially educational institutions, training providers, and commercial eLearning platforms using Tutor LMS, this vulnerability can result in unauthorized course enrollments, leading to direct financial losses due to bypassed payments. It also risks the integrity of course content and user data by allowing unauthorized users access to restricted materials. This could undermine trust in the platform and damage reputations. Additionally, unauthorized access might facilitate further attacks if course content includes sensitive information or if attackers leverage access to escalate privileges. The impact is primarily on the integrity of enrollment processes and the business model of paid courses, with limited direct confidentiality or availability impact. However, the ease of exploitation by low-privilege authenticated users increases the risk of widespread abuse if left unmitigated.
Mitigation Recommendations
1. Immediately restrict subscriber-level user permissions to prevent unauthorized access to enrollment functionalities until a patch is available. 2. Implement custom capability checks or filters in WordPress to enforce purchase validation before enrollment. 3. Monitor and audit course enrollment logs for unusual or unauthorized activity. 4. Disable or restrict AJAX endpoints related to course enrollment for low-privilege users if possible. 5. Engage with the vendor (Themeum) to obtain or request an official patch and apply it promptly once released. 6. Educate administrators and instructors about the vulnerability and encourage vigilance in monitoring course access. 7. Consider temporary alternative enrollment workflows that require manual approval to prevent automated abuse. 8. Keep WordPress core and all plugins updated to minimize exposure to related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-13934: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
Description
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized course enrollment in all versions up to, and including, 3.9.3. This is due to a missing capability check and purchasability validation in the `course_enrollment()` AJAX handler. This makes it possible for authenticated attackers, with subscriber level access and above, to enroll themselves in any course without going through the proper purchase flow.
AI-Powered Analysis
Technical Analysis
CVE-2025-13934 is a missing authorization vulnerability (CWE-862) in the Tutor LMS plugin for WordPress, a widely used eLearning and online course management solution. The flaw exists in the `course_enrollment()` AJAX handler, which lacks proper capability checks and purchasability validation. This allows any authenticated user with subscriber-level privileges or higher to bypass the purchase flow and enroll themselves in any course. The vulnerability affects all versions up to 3.9.3 inclusive. The attack vector is remote and requires only low privileges (subscriber access), with no user interaction needed beyond authentication. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but a clear integrity impact due to unauthorized course enrollment. There are no known exploits in the wild, and no patches have been officially released at the time of reporting. The vulnerability can lead to unauthorized access to paid course content, undermining revenue models and potentially exposing course materials to unauthorized users. Given the plugin’s popularity in WordPress-based eLearning platforms, this vulnerability poses a risk to educational institutions and commercial course providers using Tutor LMS.
Potential Impact
For European organizations, especially educational institutions, training providers, and commercial eLearning platforms using Tutor LMS, this vulnerability can result in unauthorized course enrollments, leading to direct financial losses due to bypassed payments. It also risks the integrity of course content and user data by allowing unauthorized users access to restricted materials. This could undermine trust in the platform and damage reputations. Additionally, unauthorized access might facilitate further attacks if course content includes sensitive information or if attackers leverage access to escalate privileges. The impact is primarily on the integrity of enrollment processes and the business model of paid courses, with limited direct confidentiality or availability impact. However, the ease of exploitation by low-privilege authenticated users increases the risk of widespread abuse if left unmitigated.
Mitigation Recommendations
1. Immediately restrict subscriber-level user permissions to prevent unauthorized access to enrollment functionalities until a patch is available. 2. Implement custom capability checks or filters in WordPress to enforce purchase validation before enrollment. 3. Monitor and audit course enrollment logs for unusual or unauthorized activity. 4. Disable or restrict AJAX endpoints related to course enrollment for low-privilege users if possible. 5. Engage with the vendor (Themeum) to obtain or request an official patch and apply it promptly once released. 6. Educate administrators and instructors about the vulnerability and encourage vigilance in monitoring course access. 7. Consider temporary alternative enrollment workflows that require manual approval to prevent automated abuse. 8. Keep WordPress core and all plugins updated to minimize exposure to related vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T22:22:20.669Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960b130ecefc3cd7c0f7cfb
Added to database: 1/9/2026, 7:41:36 AM
Last enriched: 1/9/2026, 7:58:30 AM
Last updated: 1/10/2026, 12:29:06 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15501: OS Command Injection in Sangfor Operation and Maintenance Management System
CriticalCVE-2026-22584: CWE-94 Improper Control of Generation of Code ('Code Injection') in Salesforce Uni2TS
UnknownCVE-2025-62487: The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. in Palantir com.palantir.acme:gotham-default-apps-bundle
LowCVE-2025-46299: Processing maliciously crafted web content may disclose internal states of the app in Apple tvOS
MediumCVE-2025-46298: Processing maliciously crafted web content may lead to an unexpected process crash in Apple tvOS
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.