Description
The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.9.5 via the Social Login addon. This is due to the plugin failing to verify that the email provided in the authentication request matches the email from the validated OAuth token. This makes it possible for unauthenticated attackers to log in as any existing user, including administrators, by supplying a valid OAuth token from their own account along with the victim's email address.
Published: 2026-03-10
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass enabling unauthorized privileged access
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to circumvent authentication by providing a valid OAuth token from their own account together with any victim’s email address. The plugin does not verify that the email in the request matches the email returned by the OAuth provider, so unauthenticated users can log in as any existing user, including administrators. This flaw results in full impersonation and unauthorized control over the WordPress site. The weak point is an authentication validation weakness (CWE-287).

Affected Systems

WordPress sites that use the Tutor LMS Pro plugin version 3.9.5 or earlier, including those with the Social Login addon enabled. The affected vendor is Themeum for Tutor LMS Pro. No additional version details are supplied beyond the <= 3.9.5 range.

Risk and Exploitability

The CVSS base score is 9.8, indicating critical severity, while the EPSS score is less than 1%, suggesting that widespread exploitation is not currently observed but the vulnerability remains potent. The flaw is not listed in the CISA KEV catalog, but because it grants full administrative access with minimal prerequisites—a valid OAuth token and any email address—it poses a high risk wherever the plugin is installed. The likely attack vector is through the Social Login integration, where an attacker can submit crafted authentication requests to the plugin’s OAuth endpoint to obtain a session as any user.

Generated by OpenCVE AI on April 15, 2026 at 17:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Tutor LMS Pro to version 3.9.6 or later to apply the vendor’s fix.
  • If a patch cannot be applied immediately, disable the Social Login addon to remove the vulnerable authentication path.
  • Perform a security audit of user accounts and authentication logs to detect any unauthorized access that may have occurred prior to mitigation.

Generated by OpenCVE AI on April 15, 2026 at 17:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Themeum
Themeum tutor Lms
Wordpress
Wordpress wordpress
Vendors & Products Themeum
Themeum tutor Lms
Wordpress
Wordpress wordpress

Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 05:45:00 +0000

Type Values Removed Values Added
Description The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.9.5 via the Social Login addon. This is due to the plugin failing to verify that the email provided in the authentication request matches the email from the validated OAuth token. This makes it possible for unauthenticated attackers to log in as any existing user, including administrators, by supplying a valid OAuth token from their own account along with the victim's email address.
Title Tutor LMS Pro <= 3.9.5 - Authentication Bypass via Social Login
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Themeum Tutor Lms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:29.685Z

Reserved: 2026-01-14T19:02:05.215Z

Link: CVE-2026-0953

cve-icon Vulnrichment

Updated: 2026-03-10T15:58:53.646Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-10T17:31:40.537

Modified: 2026-03-11T13:53:47.157

Link: CVE-2026-0953

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:45:10Z

Weaknesses