Vulnerabilities > CVE-2024-5438 - Authorization Bypass Through User-Controlled Key vulnerability in Themeum Tutor LMS
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
NONE Integrity impact
LOW Availability impact
NONE Summary
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.7.1 via the 'attempt_delete' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Instructor-level access and above, to delete arbitrary quiz attempts.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
References
- https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Quiz.php#L1806
- https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Quiz.php#L1806
- https://plugins.trac.wordpress.org/changeset/3098465/
- https://plugins.trac.wordpress.org/changeset/3098465/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/00ec14d4-d97b-40b1-b61b-05e911f49bb0?source=cve
- https://www.wordfence.com/threat-intel/vulnerabilities/id/00ec14d4-d97b-40b1-b61b-05e911f49bb0?source=cve