The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.1. This is due to missing or incorrect nonce validation on the erase_tutor_data() function. This makes it possible for unauthenticated attackers to deactivate the plugin and erase all data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This requires the "Erase upon uninstallation" option to be enabled.
Metrics
Affected Vendors & Products
References
History
Wed, 15 Jan 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Themeum
Themeum tutor Lms |
|
Weaknesses | CWE-352 | |
CPEs | cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Themeum
Themeum tutor Lms |
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-03-12T23:33:49.090Z
Updated: 2024-08-02T20:13:37.202Z
Reserved: 2024-02-14T18:06:20.176Z
Link: CVE-2024-1503
Vulnrichment
Updated: 2024-08-01T18:40:21.180Z
NVD
Status : Analyzed
Published: 2024-03-21T02:51:43.260
Modified: 2025-01-15T18:35:32.333
Link: CVE-2024-1503
Redhat
No data.