CVE-2025-13673

Themeum · Tutor LMS Plugin

The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter, potentially allowing for unauthorized database access.

Executive summary

A critical SQL Injection vulnerability in the Tutor LMS plugin for WordPress allows attackers to manipulate database queries, risking the theft of sensitive learner and instructor data.

Vulnerability

The vulnerability is a SQL Injection flaw located in the 'coupon_code' parameter of the Tutor LMS plugin. This allows an attacker—potentially unauthenticated if the coupon field is accessible on public checkout pages—to inject malicious SQL commands into the database query.

Business impact

Successful exploitation could lead to the unauthorized disclosure of sensitive information, including user emails, hashed passwords, and course data. The CVSS score of 7.5 reflects a high severity, as SQL injection can often be used to bypass authentication and gain full control over the application's database.

Remediation

Immediate Action: Update the Tutor LMS plugin to the latest patched version immediately to resolve the insecure handling of the 'coupon_code' parameter.

Proactive Monitoring: Monitor database logs for unusual query patterns or syntax errors associated with the 'coupon_code' field.

Compensating Controls: Deploy a Web Application Firewall (WAF) with SQL injection protection enabled to intercept and block malicious payloads before they reach the application.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability should be addressed with high priority. Organizations using Tutor LMS must apply the latest update immediately to protect their student and instructor data from unauthorized access and potential theft.