CVE-2025-13935: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized course completion in all versions up to, and including, 3.9.2. This is due to missing enrollment verification in the 'mark_course_complete' function. This makes it possible for authenticated attackers, with subscriber level access and above, to mark any course as completed.
AI Analysis
Technical Summary
CVE-2025-13935 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Tutor LMS plugin for WordPress, versions up to and including 3.9.2. The flaw resides in the 'mark_course_complete' function, which lacks proper enrollment verification before allowing a user to mark a course as completed. This means that any authenticated user with subscriber-level permissions or higher can manipulate course completion status without actually completing the course or being enrolled. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, meaning the attack vector is network-based, requires low attack complexity, privileges at the level of a subscriber, no user interaction, unchanged scope, no confidentiality or availability impact, but partial integrity impact. No patches or fixes have been released at the time of publication, and no known exploits are reported in the wild. The vulnerability primarily threatens the integrity of course completion data, potentially undermining the trustworthiness of eLearning certifications and progress tracking within affected installations.
Potential Impact
For European organizations, especially educational institutions, corporate training departments, and eLearning providers using Tutor LMS, this vulnerability can lead to unauthorized course completions. This undermines the integrity of training records, potentially allowing users to fraudulently claim course completion and certifications. Such data integrity issues can affect compliance with training requirements, accreditation standards, and internal policies. While the vulnerability does not expose sensitive data or disrupt service availability, the reputational damage and administrative overhead to verify legitimate completions could be significant. Organizations relying on Tutor LMS for regulated training or professional development may face challenges in audit and compliance processes. Additionally, if attackers combine this vulnerability with social engineering or insider threats, it could facilitate broader misuse of learning management systems in Europe.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several practical mitigations: 1) Restrict subscriber-level user permissions to trusted individuals only, minimizing the risk of unauthorized course completion. 2) Implement additional enrollment verification controls outside the plugin, such as manual approval workflows or integration with external identity management systems. 3) Monitor and audit course completion logs regularly to detect suspicious or anomalous completion patterns. 4) Disable or limit the use of the 'mark_course_complete' function via custom code or WordPress hooks if feasible. 5) Educate administrators and instructors about the vulnerability and encourage vigilance in verifying course completions. 6) Plan for prompt application of vendor patches once available and test updates in staging environments before production deployment. 7) Consider alternative LMS solutions if the risk is unacceptable and patching is delayed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-13935: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
Description
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized course completion in all versions up to, and including, 3.9.2. This is due to missing enrollment verification in the 'mark_course_complete' function. This makes it possible for authenticated attackers, with subscriber level access and above, to mark any course as completed.
AI-Powered Analysis
Technical Analysis
CVE-2025-13935 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Tutor LMS plugin for WordPress, versions up to and including 3.9.2. The flaw resides in the 'mark_course_complete' function, which lacks proper enrollment verification before allowing a user to mark a course as completed. This means that any authenticated user with subscriber-level permissions or higher can manipulate course completion status without actually completing the course or being enrolled. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, meaning the attack vector is network-based, requires low attack complexity, privileges at the level of a subscriber, no user interaction, unchanged scope, no confidentiality or availability impact, but partial integrity impact. No patches or fixes have been released at the time of publication, and no known exploits are reported in the wild. The vulnerability primarily threatens the integrity of course completion data, potentially undermining the trustworthiness of eLearning certifications and progress tracking within affected installations.
Potential Impact
For European organizations, especially educational institutions, corporate training departments, and eLearning providers using Tutor LMS, this vulnerability can lead to unauthorized course completions. This undermines the integrity of training records, potentially allowing users to fraudulently claim course completion and certifications. Such data integrity issues can affect compliance with training requirements, accreditation standards, and internal policies. While the vulnerability does not expose sensitive data or disrupt service availability, the reputational damage and administrative overhead to verify legitimate completions could be significant. Organizations relying on Tutor LMS for regulated training or professional development may face challenges in audit and compliance processes. Additionally, if attackers combine this vulnerability with social engineering or insider threats, it could facilitate broader misuse of learning management systems in Europe.
Mitigation Recommendations
Until an official patch is released, European organizations should implement several practical mitigations: 1) Restrict subscriber-level user permissions to trusted individuals only, minimizing the risk of unauthorized course completion. 2) Implement additional enrollment verification controls outside the plugin, such as manual approval workflows or integration with external identity management systems. 3) Monitor and audit course completion logs regularly to detect suspicious or anomalous completion patterns. 4) Disable or limit the use of the 'mark_course_complete' function via custom code or WordPress hooks if feasible. 5) Educate administrators and instructors about the vulnerability and encourage vigilance in verifying course completions. 6) Plan for prompt application of vendor patches once available and test updates in staging environments before production deployment. 7) Consider alternative LMS solutions if the risk is unacceptable and patching is delayed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T22:22:21.248Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960b130ecefc3cd7c0f7cff
Added to database: 1/9/2026, 7:41:36 AM
Last enriched: 1/9/2026, 7:58:14 AM
Last updated: 1/9/2026, 11:35:18 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15501: OS Command Injection in Sangfor Operation and Maintenance Management System
CriticalCVE-2026-22584: CWE-94 Improper Control of Generation of Code ('Code Injection') in Salesforce Uni2TS
HighCVE-2025-62487: The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. in Palantir com.palantir.acme:gotham-default-apps-bundle
LowCVE-2025-46299: Processing maliciously crafted web content may disclose internal states of the app in Apple tvOS
MediumCVE-2025-46298: Processing maliciously crafted web content may lead to an unexpected process crash in Apple tvOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.