The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to and including 3.9.9. This is due to the `get_course_id_by()` function unconditionally trusting the user-supplied `course` GET parameter as the authoritative course ID for content ownership lookups, which is then consumed by `can_user_manage()`, the plugin's sole authorization gate for instructor-level operations, causing it to evaluate instructor membership against the attacker-controlled course rather than the course that actually owns the target content object. This makes it possible for authenticated attackers, with instructor-level access and above, to perform unauthorized operations on any other instructor's course content, including permanently deleting lessons, assignments, quizzes (with cascading deletion of all student attempt data), topics, announcements, and Q&A threads, as well as creating or modifying lessons, topics, and announcements in victim courses, manipulating student quiz grades, and reading unpublished lesson and quiz content.
References
Link Providers
https://www.spirityenterprise.com/cyber-awareness spirity
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Ajax.php#L294 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Ajax.php#L507 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Ajax.php#L586 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Announcements.php#L105 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Course.php#L1997 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Course.php#L2045 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Lesson.php#L186 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Lesson.php#L243 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Lesson.php#L341 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Q_And_A.php#L219 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Q_And_A.php#L297 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Q_And_A.php#L339 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Quiz.php#L1007 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Quiz.php#L1041 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Quiz.php#L888 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Utils.php#L7829 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.7/classes/Utils.php#L8020 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Ajax.php#L294 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Ajax.php#L507 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Ajax.php#L586 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Announcements.php#L105 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Course.php#L1997 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Course.php#L2045 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Lesson.php#L186 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Lesson.php#L243 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Lesson.php#L341 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Q_And_A.php#L219 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Q_And_A.php#L297 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Q_And_A.php#L339 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Quiz.php#L1007 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Quiz.php#L1041 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Quiz.php#L888 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Utils.php#L7829 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/tags/3.9.9/classes/Utils.php#L8020 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Ajax.php#L294 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Ajax.php#L507 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Ajax.php#L586 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Announcements.php#L105 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Course.php#L1997 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Course.php#L2045 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Lesson.php#L186 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Lesson.php#L243 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Lesson.php#L341 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Q_And_A.php#L219 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Q_And_A.php#L297 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Q_And_A.php#L339 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Quiz.php#L1007 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Quiz.php#L1041 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Quiz.php#L888 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Utils.php#L7829 cve-icon
https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Utils.php#L8020 cve-icon
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3518400%40tutor&new=3518400%40tutor&sfp_email=&sfph_mail= cve-icon
https://www.wordfence.com/threat-intel/vulnerabilities/id/55924ea3-373c-4297-a958-5670def1f6c0?source=cve cve-icon
History

Wed, 13 May 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Themeum
Themeum tutor Lms – Elearning And Online Course Solution
Wordpress
Wordpress wordpress
Vendors & Products Themeum
Themeum tutor Lms – Elearning And Online Course Solution
Wordpress
Wordpress wordpress

Wed, 13 May 2026 06:00:00 +0000

Type Values Removed Values Added
Description The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to and including 3.9.9. This is due to the `get_course_id_by()` function unconditionally trusting the user-supplied `course` GET parameter as the authoritative course ID for content ownership lookups, which is then consumed by `can_user_manage()`, the plugin's sole authorization gate for instructor-level operations, causing it to evaluate instructor membership against the attacker-controlled course rather than the course that actually owns the target content object. This makes it possible for authenticated attackers, with instructor-level access and above, to perform unauthorized operations on any other instructor's course content, including permanently deleting lessons, assignments, quizzes (with cascading deletion of all student attempt data), topics, announcements, and Q&A threads, as well as creating or modifying lessons, topics, and announcements in victim courses, manipulating student quiz grades, and reading unpublished lesson and quiz content.
Title Tutor LMS <= 3.9.9 - Insecure Direct Object Reference to Authenticated (Instructor+) Arbitrary Post Deletion via 'course' GET Parameter
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-13T05:29:37.082Z

Reserved: 2026-04-24T16:01:40.686Z

Link: CVE-2026-6965

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.