First published: Mon Apr 05 2021(Updated: )
The tutor_quiz_builder_get_answers_by_question AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.3 was vulnerable to UNION based SQL injection that could be exploited by students.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeum Tutor LMS | <1.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-24182.
The title of the vulnerability is 'The tutor_quiz_builder_get_answers_by_question AJAX action from the Tutor LMS – eLearning and online…'
The vulnerability is a UNION based SQL injection in the tutor_quiz_builder_get_answers_by_question AJAX action of the Tutor LMS plugin, allowing exploitation by students.
The Tutor LMS plugin before version 1.8.3 is affected by the vulnerability.
The severity of the vulnerability is medium, with a CVSS score of 6.5.
The Common Weakness Enumeration (CWE) ID for the vulnerability is CWE-89.
Yes, you can find more information about the vulnerability at the following references: [Reference 1](https://wpscan.com/vulnerability/f74dfc52-46ba-41e3-994b-23115a22984f), [Reference 2](https://www.wordfence.com/blog/2021/03/several-vulnerabilities-patched-in-tutor-lms-plugin/).