Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13935: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution

0
Medium
VulnerabilityCVE-2025-13935cvecve-2025-13935cwe-862
Published: Fri Jan 09 2026 (01/09/2026, 07:22:11 UTC)
Source: CVE Database V5
Vendor/Project: themeum
Product: Tutor LMS – eLearning and online course solution

Description

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized course completion in all versions up to, and including, 3.9.2. This is due to missing enrollment verification in the 'mark_course_complete' function. This makes it possible for authenticated attackers, with subscriber level access and above, to mark any course as completed.

AI-Powered Analysis

AILast updated: 01/09/2026, 07:58:14 UTC

Technical Analysis

CVE-2025-13935 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Tutor LMS plugin for WordPress, versions up to and including 3.9.2. The flaw resides in the 'mark_course_complete' function, which lacks proper enrollment verification before allowing a user to mark a course as completed. This means that any authenticated user with subscriber-level permissions or higher can manipulate course completion status without actually completing the course or being enrolled. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, meaning the attack vector is network-based, requires low attack complexity, privileges at the level of a subscriber, no user interaction, unchanged scope, no confidentiality or availability impact, but partial integrity impact. No patches or fixes have been released at the time of publication, and no known exploits are reported in the wild. The vulnerability primarily threatens the integrity of course completion data, potentially undermining the trustworthiness of eLearning certifications and progress tracking within affected installations.

Potential Impact

For European organizations, especially educational institutions, corporate training departments, and eLearning providers using Tutor LMS, this vulnerability can lead to unauthorized course completions. This undermines the integrity of training records, potentially allowing users to fraudulently claim course completion and certifications. Such data integrity issues can affect compliance with training requirements, accreditation standards, and internal policies. While the vulnerability does not expose sensitive data or disrupt service availability, the reputational damage and administrative overhead to verify legitimate completions could be significant. Organizations relying on Tutor LMS for regulated training or professional development may face challenges in audit and compliance processes. Additionally, if attackers combine this vulnerability with social engineering or insider threats, it could facilitate broader misuse of learning management systems in Europe.

Mitigation Recommendations

Until an official patch is released, European organizations should implement several practical mitigations: 1) Restrict subscriber-level user permissions to trusted individuals only, minimizing the risk of unauthorized course completion. 2) Implement additional enrollment verification controls outside the plugin, such as manual approval workflows or integration with external identity management systems. 3) Monitor and audit course completion logs regularly to detect suspicious or anomalous completion patterns. 4) Disable or limit the use of the 'mark_course_complete' function via custom code or WordPress hooks if feasible. 5) Educate administrators and instructors about the vulnerability and encourage vigilance in verifying course completions. 6) Plan for prompt application of vendor patches once available and test updates in staging environments before production deployment. 7) Consider alternative LMS solutions if the risk is unacceptable and patching is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-02T22:22:21.248Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960b130ecefc3cd7c0f7cff

Added to database: 1/9/2026, 7:41:36 AM

Last enriched: 1/9/2026, 7:58:14 AM

Last updated: 1/9/2026, 11:35:18 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats