Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47555: Authorization Bypass Through User-Controlled Key in Themeum Tutor LMS

0
High
VulnerabilityCVE-2025-47555cvecve-2025-47555
Published: Thu Jan 22 2026 (01/22/2026, 16:51:40 UTC)
Source: CVE Database V5
Vendor/Project: Themeum
Product: Tutor LMS

Description

Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor LMS tutor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tutor LMS: from n/a through <= 3.9.4.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:28:42 UTC

Technical Analysis

CVE-2025-47555 is an authorization bypass vulnerability identified in Themeum's Tutor LMS plugin, a popular learning management system component for WordPress. The vulnerability stems from improperly configured access control mechanisms that rely on a user-controlled key, which an attacker can manipulate to circumvent authorization checks. This flaw affects Tutor LMS versions up to and including 3.9.4. The vulnerability allows an attacker with at least low-level privileges (PR:L) to remotely exploit the system without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can occur over the internet or internal networks. The scope is unchanged (S:U), indicating the exploit affects resources within the same security scope. The impact on confidentiality and integrity is high (C:H/I:H), enabling attackers to access or modify sensitive educational content, user data, or administrative settings without proper authorization. Availability impact is negligible (A:N). Although no public exploits have been reported yet, the high CVSS score of 8.1 reflects the serious risk posed by this vulnerability. The root cause is an incorrect implementation of access control checks that trust user-supplied keys, allowing privilege escalation or unauthorized data access. This vulnerability could be leveraged by malicious insiders or external attackers who have obtained low-level access, potentially leading to data breaches, unauthorized course modifications, or exposure of personal information of students and educators. The vulnerability was reserved in May 2025 and published in January 2026, indicating a recent discovery and disclosure. No patches or fixes are currently linked, so organizations must monitor vendor updates closely.

Potential Impact

For European organizations, especially educational institutions and e-learning providers using Tutor LMS, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive educational data and user information. Unauthorized access could lead to exposure of personal data protected under GDPR, resulting in legal and financial penalties. Integrity compromise could allow attackers to alter course content, grades, or user roles, undermining trust and operational reliability. Although availability is not directly impacted, the reputational damage and potential regulatory consequences could be severe. The remote exploitation capability increases the attack surface, particularly for institutions with publicly accessible LMS portals. Organizations relying on Tutor LMS for critical training or certification programs may face operational disruptions if attackers manipulate or exfiltrate data. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

Organizations should immediately inventory their Tutor LMS installations to identify affected versions (up to 3.9.4). Until an official patch is released, administrators should implement strict access controls limiting user privileges to the minimum necessary, especially for roles that can interact with the vulnerable components. Conduct thorough audits of access control configurations to identify and remediate any reliance on user-controlled keys or parameters. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate authorization keys. Monitor LMS logs for unusual access patterns or privilege escalations. Educate LMS administrators and users about the risk and encourage vigilance against suspicious activity. Once Themeum releases a security update, prioritize prompt patching and validate the fix in a test environment before deployment. Additionally, consider isolating the LMS environment within segmented network zones to reduce exposure. Regular backups of LMS data should be maintained to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:40:00.791Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6972590c4623b1157c7faa69

Added to database: 1/22/2026, 5:06:20 PM

Last enriched: 1/30/2026, 9:28:42 AM

Last updated: 2/6/2026, 3:50:49 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats