First published: Tue Sep 10 2024(Updated: )
The Tutor LMS plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.4. This is due to missing or incorrect nonce validation on the 'addon_enable_disable' function. This makes it possible for unauthenticated attackers to enable or disable addons via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeum Tutor LMS | <2.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2919 is classified as a moderate severity vulnerability due to the potential for unauthenticated attackers to exploit it.
To mitigate CVE-2023-2919, update the Tutor LMS plugin to version 2.7.5 or later.
CVE-2023-2919 allows attackers to perform unauthorized actions on your site, such as enabling or disabling addons.
CVE-2023-2919 affects Tutor LMS versions up to and including 2.7.4.
Yes, CVE-2023-2919 can be exploited remotely since it does not require authentication.