Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0953: CWE-287 Improper Authentication in themeum Tutor LMS Pro

0
Critical
VulnerabilityCVE-2026-0953cvecve-2026-0953cwe-287
Published: Tue Mar 10 2026 (03/10/2026, 05:26:28 UTC)
Source: CVE Database V5
Vendor/Project: themeum
Product: Tutor LMS Pro

Description

CVE-2026-0953 is a critical authentication bypass vulnerability in the Tutor LMS Pro WordPress plugin, affecting all versions up to 3. 9. 5 via its Social Login addon. The flaw arises because the plugin does not verify that the email address submitted during authentication matches the email associated with the validated OAuth token. This allows unauthenticated attackers to log in as any user, including administrators, by presenting a valid OAuth token from their own account combined with the victim's email address. The vulnerability has a CVSS score of 9. 8, indicating a critical severity with full impact on confidentiality, integrity, and availability without requiring user interaction or privileges. Although no known exploits are currently reported in the wild, the ease of exploitation and potential for complete account takeover make this a severe threat to organizations using Tutor LMS Pro. Immediate patching or mitigation is essential to prevent unauthorized access and potential compromise of sensitive educational data and administrative controls.

AI-Powered Analysis

AILast updated: 03/10/2026, 06:03:31 UTC

Technical Analysis

CVE-2026-0953 is an authentication bypass vulnerability classified under CWE-287, found in the Tutor LMS Pro plugin for WordPress, specifically in all versions up to and including 3.9.5. The issue lies in the Social Login addon, where the plugin fails to verify that the email address provided in the authentication request matches the email address associated with the validated OAuth token. OAuth tokens are used to authenticate users via third-party identity providers, and the plugin accepts a valid OAuth token from an attacker’s own account but pairs it with a victim’s email address without proper validation. This flaw allows an attacker to bypass authentication controls and impersonate any existing user, including administrators, without needing any prior credentials or user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible. The impact is severe, affecting confidentiality, integrity, and availability of the affected WordPress sites, potentially leading to full site compromise, data theft, and unauthorized administrative actions. Although no public exploits have been reported yet, the vulnerability’s critical CVSS score of 9.8 reflects its high risk. The vulnerability was reserved in January 2026 and published in March 2026, with no patches currently linked, indicating that users must monitor for updates or apply workarounds.

Potential Impact

The impact of CVE-2026-0953 is significant for organizations using Tutor LMS Pro, especially educational institutions and enterprises relying on WordPress for learning management. Successful exploitation allows attackers to impersonate any user, including administrators, leading to unauthorized access to sensitive educational content, user data, and administrative functions. This can result in data breaches, manipulation or deletion of course materials, disruption of LMS services, and potential lateral movement within the hosting environment. The vulnerability compromises confidentiality by exposing user data, integrity by allowing unauthorized changes, and availability by potentially disrupting LMS operations. Given the critical nature and ease of exploitation, attackers could leverage this flaw to establish persistent footholds or launch further attacks against the organization’s infrastructure. The lack of required privileges or user interaction increases the likelihood of widespread exploitation if unpatched.

Mitigation Recommendations

To mitigate CVE-2026-0953, organizations should immediately upgrade Tutor LMS Pro to a patched version once available from the vendor. Until a patch is released, administrators should disable the Social Login addon to prevent exploitation. Implementing additional access controls such as Web Application Firewalls (WAFs) with rules to detect and block anomalous OAuth token usage can reduce risk. Monitoring authentication logs for suspicious login attempts involving mismatched email and OAuth tokens is critical for early detection. Organizations should also enforce multi-factor authentication (MFA) on WordPress admin accounts to limit damage from compromised sessions. Reviewing and restricting OAuth client permissions and scopes can minimize exposure. Finally, conducting thorough security audits of all third-party plugins and limiting plugin usage to trusted, actively maintained components will reduce future risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-14T19:02:05.215Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69afb0daea502d3aa80ce240

Added to database: 3/10/2026, 5:49:14 AM

Last enriched: 3/10/2026, 6:03:31 AM

Last updated: 3/10/2026, 9:00:35 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses