Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0548: CWE-862 Missing Authorization in themeum Tutor LMS – eLearning and online course solution

0
Medium
VulnerabilityCVE-2026-0548cvecve-2026-0548cwe-862
Published: Tue Jan 20 2026 (01/20/2026, 14:26:31 UTC)
Source: CVE Database V5
Vendor/Project: themeum
Product: Tutor LMS – eLearning and online course solution

Description

CVE-2026-0548 is a medium severity vulnerability in the Tutor LMS WordPress plugin that allows authenticated users with subscriber-level access or higher to delete arbitrary attachments due to missing authorization checks. The flaw exists in the delete_existing_user_photo function, which lacks proper capability validation. Exploitation requires no user interaction but does require authentication at a low privilege level. The vulnerability impacts all versions up to and including 3. 9. 4 of the plugin. While no known exploits are currently in the wild, the vulnerability could lead to integrity and availability issues by unauthorized deletion of site attachments. European organizations using Tutor LMS for eLearning should prioritize patching or mitigating this issue to prevent potential disruption or data loss. Countries with high WordPress adoption and significant eLearning sectors are most at risk. Mitigation involves applying updates once available, restricting subscriber permissions, and monitoring attachment deletions closely.

AI-Powered Analysis

AILast updated: 01/20/2026, 19:21:29 UTC

Technical Analysis

CVE-2026-0548 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Tutor LMS plugin for WordPress, a popular eLearning and online course management solution. The vulnerability arises from the delete_existing_user_photo function, which fails to perform adequate capability checks before allowing deletion of user attachments. This missing authorization check enables any authenticated user with subscriber-level privileges or higher to delete arbitrary attachments on the WordPress site, potentially including course materials, user-uploaded files, or other critical content. The vulnerability affects all versions up to and including 3.9.4. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts integrity and availability but not confidentiality. Exploitation could disrupt eLearning operations by removing essential files, causing data loss or service degradation. No patches or exploits are currently publicly available, but the risk remains significant due to the ease of exploitation and the broad user base of the plugin. The vulnerability highlights the importance of proper authorization checks in web application functions that modify or delete resources. Organizations relying on Tutor LMS should monitor for updates from the vendor and implement compensating controls in the interim.

Potential Impact

For European organizations, the vulnerability could lead to unauthorized deletion of critical attachments such as course content, user submissions, or multimedia resources hosted on Tutor LMS-powered WordPress sites. This may result in operational disruption, loss of educational materials, and degraded user experience for students and educators. The integrity and availability of eLearning platforms could be compromised, potentially affecting compliance with data retention policies and contractual obligations. Organizations in sectors like education, corporate training, and public institutions that use Tutor LMS are particularly vulnerable. The ease of exploitation by low-privilege authenticated users increases the risk of insider threats or compromised accounts being leveraged to cause damage. While confidentiality is not directly impacted, the loss of data availability and integrity could have cascading effects on organizational reputation and continuity of learning services.

Mitigation Recommendations

1. Monitor the vendor’s official channels for patches addressing CVE-2026-0548 and apply updates promptly once released. 2. Until patches are available, restrict subscriber-level permissions to the minimum necessary, removing any unnecessary capabilities that might allow attachment deletion. 3. Implement additional access controls or plugins that enforce stricter authorization checks on file deletion operations within WordPress. 4. Audit and monitor logs for unusual attachment deletion activities, especially from subscriber or low-privilege accounts. 5. Educate administrators and users about the risk and encourage strong authentication practices to reduce the risk of account compromise. 6. Consider isolating critical eLearning content storage from the WordPress environment or using external content delivery networks with stricter access controls. 7. Regularly back up all site content, including attachments, to enable rapid restoration in case of unauthorized deletions. 8. Review and harden WordPress security configurations and user role assignments to minimize attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-01T16:58:14.820Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696fd2e84623b1157c48f856

Added to database: 1/20/2026, 7:09:28 PM

Last enriched: 1/20/2026, 7:21:29 PM

Last updated: 1/20/2026, 8:25:51 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats