Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2026-0953 โ€” AI Deep Analysis Summary

CVSS 9.8 ยท Critical

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: Tutor LMS Pro has a critical **Authorization Flaw**. ๐Ÿ“‰ **Consequences**: Attackers can bypass authentication and impersonate **any existing user**.โ€ฆ

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: **CWE-287** (Improper Authentication). The plugin fails to verify if the **email** in the request matches the **email** in the validated OAuth token. ๐Ÿšซ Logic gap in identity validation.

Q3Who is affected? (Versions/Components)

๐Ÿ“ฆ **Affected**: **Tutor LMS Pro** by **Themeum**. ๐Ÿ“… **Version**: 3.9.5 and **earlier** versions. โš ๏ธ If you are running < 3.9.6, you are vulnerable.

Q4What can hackers do? (Privileges/Data)

๐Ÿ’€ **Attacker Capabilities**: Login as **ANY** user. ๐Ÿ“Š **Impact**: High Confidentiality, Integrity, and Availability loss. Hackers can access private course data, modify user profiles, and disrupt learning environments.

Q5Is exploitation threshold high? (Auth/Config)

๐Ÿ“‰ **Threshold**: **LOW**. ๐Ÿš€ **CVSS**: 9.8 (Critical). No authentication (PR:N), no user interaction (UI:N), network accessible (AV:N). It is an **easy win** for automated bots.

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ” **Public Exp?**: No specific PoC code provided in data. ๐ŸŒ **Status**: High risk of wild exploitation due to low barrier. WordFence has issued a threat intel alert, signaling active monitoring.

Q7How to self-check? (Features/Scanning)

๐Ÿ”Ž **Self-Check**: Scan for **Tutor LMS Pro** plugin. โœ… **Verify Version**: Ensure it is **not** 3.9.5 or older. ๐Ÿ› ๏ธ Check OAuth token handling logic if custom development is involved.

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿ”ง **Fix**: Update to the latest version immediately. ๐Ÿ“ข **Reference**: Themeum released a fix (see tutorlms.com/releases/id/393/). ๐Ÿ”„ **Action**: Upgrade past 3.9.5 to patch the email mismatch flaw.

Q9What if no patch? (Workaround)

๐Ÿšง **No Patch?**: Disable the plugin temporarily. ๐Ÿšซ **Block**: Restrict access to OAuth endpoints via WAF. ๐Ÿ‘ฎ **Monitor**: Alert on unusual login patterns or email mismatches in logs.

Q10Is it urgent? (Priority Suggestion)

๐Ÿ”ฅ **Urgency**: **CRITICAL**. โณ **Priority**: Patch **IMMEDIATELY**. CVSS 9.8 means this is a top-tier emergency. Do not wait. Protect user data and site integrity now.