CVE-2025-6184: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeum Tutor LMS Pro
The Tutor LMS Pro – eLearning and online course solution plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter used in the get_submitted_assignments() function in all versions up to, and including, 3.7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Tutor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only the Pro version is affected.
AI Analysis
Technical Summary
CVE-2025-6184 is a high-severity SQL Injection vulnerability affecting the Tutor LMS Pro plugin for WordPress, versions up to and including 3.7.0. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89) specifically through the 'order' parameter in the get_submitted_assignments() function. This parameter is insufficiently escaped and the SQL query is not properly prepared, allowing authenticated users with at least Tutor-level access to inject additional SQL commands. This time-based SQL Injection enables attackers to extract sensitive information from the backend database by appending malicious SQL queries. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The CVSS v3.1 score is 8.8, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the vulnerability’s nature and ease of exploitation make it a significant threat to affected systems. Since Tutor LMS Pro is widely used in eLearning environments on WordPress, exploitation could lead to unauthorized data disclosure, data manipulation, or denial of service, severely impacting educational institutions and organizations relying on this plugin for course management.
Potential Impact
For European organizations, especially educational institutions, training providers, and enterprises using Tutor LMS Pro, this vulnerability poses a critical risk. Exploitation could lead to unauthorized access to sensitive student data, course content, and administrative information, violating GDPR and other data protection regulations. The integrity of course submissions and grading could be compromised, undermining trust in eLearning platforms. Additionally, attackers could disrupt service availability, affecting ongoing educational activities. Given the widespread adoption of WordPress and the popularity of Tutor LMS Pro in Europe’s eLearning market, the potential for data breaches and operational disruptions is significant. Organizations could face legal penalties, reputational damage, and financial losses if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately verify if they are running Tutor LMS Pro versions up to 3.7.0 and prioritize upgrading to a patched version once available from the vendor. Until a patch is released, restrict Tutor-level user permissions to trusted personnel only and monitor database and application logs for suspicious query patterns indicative of SQL injection attempts. Implement Web Application Firewalls (WAF) with custom rules to detect and block anomalous SQL queries targeting the 'order' parameter. Conduct thorough code reviews and penetration testing focusing on SQL injection vectors in the LMS environment. Additionally, enforce strict input validation and parameterized queries in custom integrations or extensions interacting with Tutor LMS Pro. Regular backups and incident response plans should be updated to quickly recover from potential data compromise or service disruption.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-6184: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in themeum Tutor LMS Pro
Description
The Tutor LMS Pro – eLearning and online course solution plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter used in the get_submitted_assignments() function in all versions up to, and including, 3.7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Tutor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only the Pro version is affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-6184 is a high-severity SQL Injection vulnerability affecting the Tutor LMS Pro plugin for WordPress, versions up to and including 3.7.0. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89) specifically through the 'order' parameter in the get_submitted_assignments() function. This parameter is insufficiently escaped and the SQL query is not properly prepared, allowing authenticated users with at least Tutor-level access to inject additional SQL commands. This time-based SQL Injection enables attackers to extract sensitive information from the backend database by appending malicious SQL queries. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The CVSS v3.1 score is 8.8, reflecting high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the vulnerability’s nature and ease of exploitation make it a significant threat to affected systems. Since Tutor LMS Pro is widely used in eLearning environments on WordPress, exploitation could lead to unauthorized data disclosure, data manipulation, or denial of service, severely impacting educational institutions and organizations relying on this plugin for course management.
Potential Impact
For European organizations, especially educational institutions, training providers, and enterprises using Tutor LMS Pro, this vulnerability poses a critical risk. Exploitation could lead to unauthorized access to sensitive student data, course content, and administrative information, violating GDPR and other data protection regulations. The integrity of course submissions and grading could be compromised, undermining trust in eLearning platforms. Additionally, attackers could disrupt service availability, affecting ongoing educational activities. Given the widespread adoption of WordPress and the popularity of Tutor LMS Pro in Europe’s eLearning market, the potential for data breaches and operational disruptions is significant. Organizations could face legal penalties, reputational damage, and financial losses if this vulnerability is exploited.
Mitigation Recommendations
Organizations should immediately verify if they are running Tutor LMS Pro versions up to 3.7.0 and prioritize upgrading to a patched version once available from the vendor. Until a patch is released, restrict Tutor-level user permissions to trusted personnel only and monitor database and application logs for suspicious query patterns indicative of SQL injection attempts. Implement Web Application Firewalls (WAF) with custom rules to detect and block anomalous SQL queries targeting the 'order' parameter. Conduct thorough code reviews and penetration testing focusing on SQL injection vectors in the LMS environment. Additionally, enforce strict input validation and parameterized queries in custom integrations or extensions interacting with Tutor LMS Pro. Regular backups and incident response plans should be updated to quickly recover from potential data compromise or service disruption.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-16T18:24:38.972Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689c3519ad5a09ad003f21b3
Added to database: 8/13/2025, 6:47:53 AM
Last enriched: 8/13/2025, 7:02:58 AM
Last updated: 8/13/2025, 8:53:59 PM
Views: 9
Related Threats
CVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-43986: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.