The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check while verifying webhook signatures on the "verifyAndCreateOrderData" function
in all versions up to, and including, 3.8.3. This makes it possible for unauthenticated attackers to bypass payment verification and mark orders as paid by submitting forged webhook requests with `payment_type` set to 'recurring'.
References
Configurations
History
05 Dec 2025, 00:26
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Themeum tutor Lms
Themeum |
|
| CPE | cpe:2.3:a:themeum:tutor_lms:*:*:*:*:free:wordpress:*:* | |
| References | () https://plugins.trac.wordpress.org/browser/tutor/tags/3.8.3/ecommerce/PaymentGateways/Paypal/src/Payments/Paypal/Paypal.php#L323 - Product | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/26289a93-063b-469a-9d09-c286d76fce0c?source=cve - Product, Third Party Advisory |
25 Oct 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-25 06:15
Updated : 2025-12-05 00:26
NVD link : CVE-2025-11564
Mitre link : CVE-2025-11564
CVE.ORG link : CVE-2025-11564
JSON object : View
Products Affected
themeum
- tutor_lms
CWE
CWE-862
Missing Authorization
