Description
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized course enrollment in all versions up to, and including, 3.9.3. This is due to a missing capability check and purchasability validation in the `course_enrollment()` AJAX handler. This makes it possible for authenticated attackers, with subscriber level access and above, to enroll themselves in any course without going through the proper purchase flow.
Published: 2026-01-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Course Enrollment
Action: Immediate Patch
AI Analysis

Impact

The Tutor LMS plugin is vulnerable in all versions up to and including 3.9.3 because the course_enrollment AJAX handler lacks a capability check and purchase validation. Authenticated users with subscriber-level access can invoke this handler to enroll themselves in any course, bypassing the normal payment flow. This allows unauthorized access to paid course content and can lead to revenue loss for site administrators.

Affected Systems

WordPress sites that have installed the Tutor LMS – eLearning and online course solution plugin with a version no newer than 3.9.3 are affected. Any site that has not upgraded beyond that version is at risk.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity while the EPSS score of less than 1% suggests that widespread exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Attackers who are authenticated with subscriber or higher privileges can exploit the flaw by sending a crafted AJAX request to the course_enrollment endpoint, thereby enrolling themselves in any course without payment. The impact is primarily financial and integrity-based, as course access is granted without following the proper purchase authorization.

Generated by OpenCVE AI on April 22, 2026 at 03:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor patch or update that adds the missing capability and purchase validation checks.
  • If an immediate upgrade is not feasible, add a temporary safeguard by restricting the course_enrollment AJAX endpoint to authorized purchase flows only, such as inserting a nonce or capability check in a custom code layer.
  • Disable the Course Enrollment AJAX endpoint until the vendor releases an official update, to prevent unauthorized enrollment by authenticated users.

Generated by OpenCVE AI on April 22, 2026 at 03:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Themeum
Themeum tutor Lms
Wordpress
Wordpress wordpress
Vendors & Products Themeum
Themeum tutor Lms
Wordpress
Wordpress wordpress

Fri, 09 Jan 2026 07:30:00 +0000

Type Values Removed Values Added
Description The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized course enrollment in all versions up to, and including, 3.9.3. This is due to a missing capability check and purchasability validation in the `course_enrollment()` AJAX handler. This makes it possible for authenticated attackers, with subscriber level access and above, to enroll themselves in any course without going through the proper purchase flow.
Title Tutor LMS – eLearning and online course solution <= 3.9.3 - Missing Authorization to Authenticated (Subscriber+) Course Enrollment Bypass
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Themeum Tutor Lms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:56:00.874Z

Reserved: 2025-12-02T22:22:20.669Z

Link: CVE-2025-13934

cve-icon Vulnrichment

Updated: 2026-01-09T19:11:43.645Z

cve-icon NVD

Status : Deferred

Published: 2026-01-09T08:15:57.007

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13934

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T04:00:07Z

Weaknesses