CVE-2026-3371Authorization Bypass Through User-Controlled Key in Tutor LMS Elearning AND Online Course Solution

Severity
4.3MEDIUMNVD
EPSS
0.0%
top 92.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 11

Description

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authorization checks in the `save_course_content_order()` private method, which is called unconditionally by the `tutor_update_course_content_order` AJAX handler. While the handler's `content_parent` branch includes a `can_user_manage()` check, the `save_course_content_order()` call processes attacker-suppl

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages1 packages

🔴Vulnerability Details

3
GHSA
GHSA-g495-hm74-5j37: The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and2026-04-11
VulDB
themeum Tutor LMS Plugin up to 3.9.7 on WordPress AJAX save_course_content_order authorization2026-04-11
CVEList
Tutor LMS <= 3.9.7 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary Course Content Modification2026-04-11
CVE-2026-3371 — MEDIUM severity | cvebase