CVE-2025-47555: Authorization Bypass Through User-Controlled Key in Themeum Tutor LMS
Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor LMS tutor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tutor LMS: from n/a through <= 3.9.4.
AI Analysis
Technical Summary
CVE-2025-47555 is an authorization bypass vulnerability identified in Themeum's Tutor LMS plugin, a popular learning management system component for WordPress. The vulnerability stems from improperly configured access control mechanisms that rely on a user-controlled key, which an attacker can manipulate to circumvent authorization checks. This flaw affects Tutor LMS versions up to and including 3.9.4. The vulnerability allows an attacker with at least low-level privileges (PR:L) to remotely exploit the system without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can occur over the internet or internal networks. The scope is unchanged (S:U), indicating the exploit affects resources within the same security scope. The impact on confidentiality and integrity is high (C:H/I:H), enabling attackers to access or modify sensitive educational content, user data, or administrative settings without proper authorization. Availability impact is negligible (A:N). Although no public exploits have been reported yet, the high CVSS score of 8.1 reflects the serious risk posed by this vulnerability. The root cause is an incorrect implementation of access control checks that trust user-supplied keys, allowing privilege escalation or unauthorized data access. This vulnerability could be leveraged by malicious insiders or external attackers who have obtained low-level access, potentially leading to data breaches, unauthorized course modifications, or exposure of personal information of students and educators. The vulnerability was reserved in May 2025 and published in January 2026, indicating a recent discovery and disclosure. No patches or fixes are currently linked, so organizations must monitor vendor updates closely.
Potential Impact
For European organizations, especially educational institutions and e-learning providers using Tutor LMS, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive educational data and user information. Unauthorized access could lead to exposure of personal data protected under GDPR, resulting in legal and financial penalties. Integrity compromise could allow attackers to alter course content, grades, or user roles, undermining trust and operational reliability. Although availability is not directly impacted, the reputational damage and potential regulatory consequences could be severe. The remote exploitation capability increases the attack surface, particularly for institutions with publicly accessible LMS portals. Organizations relying on Tutor LMS for critical training or certification programs may face operational disruptions if attackers manipulate or exfiltrate data. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability.
Mitigation Recommendations
Organizations should immediately inventory their Tutor LMS installations to identify affected versions (up to 3.9.4). Until an official patch is released, administrators should implement strict access controls limiting user privileges to the minimum necessary, especially for roles that can interact with the vulnerable components. Conduct thorough audits of access control configurations to identify and remediate any reliance on user-controlled keys or parameters. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate authorization keys. Monitor LMS logs for unusual access patterns or privilege escalations. Educate LMS administrators and users about the risk and encourage vigilance against suspicious activity. Once Themeum releases a security update, prioritize prompt patching and validate the fix in a test environment before deployment. Additionally, consider isolating the LMS environment within segmented network zones to reduce exposure. Regular backups of LMS data should be maintained to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-47555: Authorization Bypass Through User-Controlled Key in Themeum Tutor LMS
Description
Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor LMS tutor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tutor LMS: from n/a through <= 3.9.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-47555 is an authorization bypass vulnerability identified in Themeum's Tutor LMS plugin, a popular learning management system component for WordPress. The vulnerability stems from improperly configured access control mechanisms that rely on a user-controlled key, which an attacker can manipulate to circumvent authorization checks. This flaw affects Tutor LMS versions up to and including 3.9.4. The vulnerability allows an attacker with at least low-level privileges (PR:L) to remotely exploit the system without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can occur over the internet or internal networks. The scope is unchanged (S:U), indicating the exploit affects resources within the same security scope. The impact on confidentiality and integrity is high (C:H/I:H), enabling attackers to access or modify sensitive educational content, user data, or administrative settings without proper authorization. Availability impact is negligible (A:N). Although no public exploits have been reported yet, the high CVSS score of 8.1 reflects the serious risk posed by this vulnerability. The root cause is an incorrect implementation of access control checks that trust user-supplied keys, allowing privilege escalation or unauthorized data access. This vulnerability could be leveraged by malicious insiders or external attackers who have obtained low-level access, potentially leading to data breaches, unauthorized course modifications, or exposure of personal information of students and educators. The vulnerability was reserved in May 2025 and published in January 2026, indicating a recent discovery and disclosure. No patches or fixes are currently linked, so organizations must monitor vendor updates closely.
Potential Impact
For European organizations, especially educational institutions and e-learning providers using Tutor LMS, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive educational data and user information. Unauthorized access could lead to exposure of personal data protected under GDPR, resulting in legal and financial penalties. Integrity compromise could allow attackers to alter course content, grades, or user roles, undermining trust and operational reliability. Although availability is not directly impacted, the reputational damage and potential regulatory consequences could be severe. The remote exploitation capability increases the attack surface, particularly for institutions with publicly accessible LMS portals. Organizations relying on Tutor LMS for critical training or certification programs may face operational disruptions if attackers manipulate or exfiltrate data. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability.
Mitigation Recommendations
Organizations should immediately inventory their Tutor LMS installations to identify affected versions (up to 3.9.4). Until an official patch is released, administrators should implement strict access controls limiting user privileges to the minimum necessary, especially for roles that can interact with the vulnerable components. Conduct thorough audits of access control configurations to identify and remediate any reliance on user-controlled keys or parameters. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate authorization keys. Monitor LMS logs for unusual access patterns or privilege escalations. Educate LMS administrators and users about the risk and encourage vigilance against suspicious activity. Once Themeum releases a security update, prioritize prompt patching and validate the fix in a test environment before deployment. Additionally, consider isolating the LMS environment within segmented network zones to reduce exposure. Regular backups of LMS data should be maintained to enable recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:40:00.791Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6972590c4623b1157c7faa69
Added to database: 1/22/2026, 5:06:20 PM
Last enriched: 1/30/2026, 9:28:42 AM
Last updated: 2/6/2026, 3:50:49 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1976: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1975: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1228: CWE-639 Authorization Bypass Through User-Controlled Key in bplugins Timeline Block – Beautiful Timeline Builder for WordPress (Vertical & Horizontal Timelines)
MediumCVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.