EUVD-2025-208856

| CVE-2025-32223 MEDIUM
2026-03-19 Patchstack
6.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 19, 2026 - 08:30 vuln.today
EUVD ID Assigned
Mar 19, 2026 - 08:30 euvd
EUVD-2025-208856
CVE Published
Mar 19, 2026 - 08:05 nvd
MEDIUM 6.5

Description

Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor LMS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Tutor LMS: from n/a through 3.9.4.

Analysis

An authorization bypass vulnerability exists in Themeum Tutor LMS through version 3.9.4 that allows authenticated users to access resources they should not have permission to view through user-controlled keys in the access control mechanism. This Insecure Direct Object Reference (IDOR) vulnerability affects all Tutor LMS installations up to and including version 3.9.4, enabling an attacker with low privileges to read sensitive data by manipulating object identifiers. The vulnerability has a CVSS score of 6.5 reflecting moderate severity with high confidentiality impact, and while no KEV or widespread POC exploitation has been publicly confirmed, the attack requires only network access and valid authentication credentials.

Technical Context

This vulnerability is rooted in CWE-639 (Authorization Bypass Through User-Controlled Key), a weakness where applications use user-supplied input directly as an authorization decision point without proper server-side validation. In the context of Themeum Tutor LMS (identified via CPE cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:*:*:*), the vulnerability manifests as an Insecure Direct Object Reference (IDOR) flaw affecting access control security levels. The LMS fails to properly validate whether the authenticated user has legitimate authorization to access course materials, student records, or other protected resources when object identifiers (such as course IDs, student IDs, or lesson IDs) are manipulated in API requests or URL parameters. Rather than enforcing server-side authorization checks based on user roles and enrolled courses, the application relies on client-controlled keys or parameters, allowing privilege escalation within the authentication context.

Affected Products

Themeum Tutor LMS is affected in all versions from the earliest available through version 3.9.4, as confirmed by the CPE string cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:*:*:*. The vulnerability has been reported by Patchstack and documented in their vulnerability database at https://patchstack.com/database/wordpress/plugin/tutor/vulnerability/wordpress-tutor-lms-plugin-3-9-4-insecure-direct-object-references-idor-vulnerability-2. Tutor LMS is a popular WordPress plugin for creating and managing online courses, making this vulnerability applicable to any WordPress installation using Tutor LMS up to version 3.9.4.

Remediation

Immediately upgrade Themeum Tutor LMS to a version released after 3.9.4, which should contain authorization bypass fixes. Visit the official Tutor LMS plugin page in the WordPress plugin directory or the vendor's security advisory at https://patchstack.com/database/wordpress/plugin/tutor/ for the specific patched version. Until patching is completed, implement server-side access control verification in the WordPress environment by using role-based capability checks for all course and student data access, ensure that no object identifiers are directly exposed to users without validation, and restrict plugin functionality to trusted administrators via WordPress user role management. Additionally, review WordPress user account access logs and disable accounts with unnecessary privilege levels to minimize the attack surface for credential-based exploitation.

Priority Score

33
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +32
POC: 0

Share

EUVD-2025-208856 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy