CVE-2025-13935: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
CVE-2025-13935 is a medium severity vulnerability in the Tutor LMS WordPress plugin that allows authenticated users with subscriber-level access or higher to mark any course as completed without proper enrollment verification. This missing authorization flaw (CWE-862) affects all versions up to 3. 9. 2 and can lead to integrity issues in course completion records. The vulnerability does not impact confidentiality or availability and requires no user interaction beyond authentication. There are no known exploits in the wild, and no official patches have been released yet. European organizations using Tutor LMS for eLearning should be aware of potential misuse that could undermine course certification and assessment processes. Mitigation involves restricting subscriber permissions, monitoring course completion logs, and applying vendor patches once available. Countries with significant WordPress and eLearning adoption, such as Germany, France, the UK, and the Netherlands, are most likely to be affected. Overall, the vulnerability poses a moderate risk primarily to the integrity of eLearning outcomes.
AI Analysis
Technical Summary
CVE-2025-13935 is a vulnerability identified in the Tutor LMS plugin for WordPress, a widely used eLearning and online course management solution. The flaw arises from missing authorization checks in the 'mark_course_complete' function, which fails to verify whether a user is properly enrolled in a course before allowing them to mark it as completed. This missing enrollment verification (classified under CWE-862: Missing Authorization) permits any authenticated user with subscriber-level privileges or higher to fraudulently mark courses as completed, bypassing normal course progression and completion requirements. The vulnerability affects all versions up to and including 3.9.2 of the plugin. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based and requires low privileges but does not impact confidentiality or availability, only integrity. No user interaction is needed beyond authentication, and no known exploits have been reported in the wild. The lack of patch links indicates that a fix has not yet been publicly released. This vulnerability undermines the integrity of course completion data, potentially allowing users to gain unauthorized certifications or progress without fulfilling course requirements, which can damage the trustworthiness of eLearning platforms relying on Tutor LMS.
Potential Impact
For European organizations, especially educational institutions, corporate training departments, and certification bodies using Tutor LMS, this vulnerability can lead to significant integrity issues. Unauthorized course completion can result in fraudulent certifications, devaluing legitimate achievements and potentially causing reputational damage. In regulated sectors or where compliance training is mandatory, this could lead to non-compliance risks if users bypass required training. While confidentiality and availability remain unaffected, the integrity compromise could undermine trust in eLearning platforms and necessitate costly audits or revalidation of training records. The impact is particularly relevant for organizations relying heavily on automated course completion tracking for employee development or regulatory compliance.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls to limit subscriber-level permissions and monitor user activities related to course completion. Administrators can audit course completion logs regularly to detect anomalous completions inconsistent with enrollment records. Consider disabling the 'mark_course_complete' functionality for lower-privileged users via custom code or plugin configuration if feasible. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable function. Additionally, organizations should maintain up-to-date backups of LMS data to allow restoration if fraudulent completions are detected. Once a vendor patch is available, prioritize its deployment and verify that enrollment verification is properly enforced. Educate users and administrators about the risk and encourage reporting of suspicious course completions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-13935: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution
Description
CVE-2025-13935 is a medium severity vulnerability in the Tutor LMS WordPress plugin that allows authenticated users with subscriber-level access or higher to mark any course as completed without proper enrollment verification. This missing authorization flaw (CWE-862) affects all versions up to 3. 9. 2 and can lead to integrity issues in course completion records. The vulnerability does not impact confidentiality or availability and requires no user interaction beyond authentication. There are no known exploits in the wild, and no official patches have been released yet. European organizations using Tutor LMS for eLearning should be aware of potential misuse that could undermine course certification and assessment processes. Mitigation involves restricting subscriber permissions, monitoring course completion logs, and applying vendor patches once available. Countries with significant WordPress and eLearning adoption, such as Germany, France, the UK, and the Netherlands, are most likely to be affected. Overall, the vulnerability poses a moderate risk primarily to the integrity of eLearning outcomes.
AI-Powered Analysis
Technical Analysis
CVE-2025-13935 is a vulnerability identified in the Tutor LMS plugin for WordPress, a widely used eLearning and online course management solution. The flaw arises from missing authorization checks in the 'mark_course_complete' function, which fails to verify whether a user is properly enrolled in a course before allowing them to mark it as completed. This missing enrollment verification (classified under CWE-862: Missing Authorization) permits any authenticated user with subscriber-level privileges or higher to fraudulently mark courses as completed, bypassing normal course progression and completion requirements. The vulnerability affects all versions up to and including 3.9.2 of the plugin. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based and requires low privileges but does not impact confidentiality or availability, only integrity. No user interaction is needed beyond authentication, and no known exploits have been reported in the wild. The lack of patch links indicates that a fix has not yet been publicly released. This vulnerability undermines the integrity of course completion data, potentially allowing users to gain unauthorized certifications or progress without fulfilling course requirements, which can damage the trustworthiness of eLearning platforms relying on Tutor LMS.
Potential Impact
For European organizations, especially educational institutions, corporate training departments, and certification bodies using Tutor LMS, this vulnerability can lead to significant integrity issues. Unauthorized course completion can result in fraudulent certifications, devaluing legitimate achievements and potentially causing reputational damage. In regulated sectors or where compliance training is mandatory, this could lead to non-compliance risks if users bypass required training. While confidentiality and availability remain unaffected, the integrity compromise could undermine trust in eLearning platforms and necessitate costly audits or revalidation of training records. The impact is particularly relevant for organizations relying heavily on automated course completion tracking for employee development or regulatory compliance.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls to limit subscriber-level permissions and monitor user activities related to course completion. Administrators can audit course completion logs regularly to detect anomalous completions inconsistent with enrollment records. Consider disabling the 'mark_course_complete' functionality for lower-privileged users via custom code or plugin configuration if feasible. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable function. Additionally, organizations should maintain up-to-date backups of LMS data to allow restoration if fraudulent completions are detected. Once a vendor patch is available, prioritize its deployment and verify that enrollment verification is properly enforced. Educate users and administrators about the risk and encourage reporting of suspicious course completions.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T22:22:21.248Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960b130ecefc3cd7c0f7cff
Added to database: 1/9/2026, 7:41:36 AM
Last enriched: 1/16/2026, 10:06:21 AM
Last updated: 2/7/2026, 6:07:11 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2026-2075: Improper Access Controls in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.