CVE-2024-3553

6.5 MEDIUM

📋 TL;DR

This vulnerability in Tutor LMS WordPress plugin allows unauthenticated attackers to enable user registration on WordPress sites where it was previously disabled. It affects all Tutor LMS plugin versions up to 2.6.2. Attackers can exploit this to create unauthorized user accounts on vulnerable WordPress installations.

💻 Affected Systems

Products:
  • Tutor LMS – eLearning and online course solution WordPress plugin
Versions: All versions up to and including 2.6.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress sites with Tutor LMS plugin installed. Vulnerability exists regardless of user registration setting.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers enable user registration, create administrative accounts, and gain full control of the WordPress site, potentially leading to data theft, defacement, or malware installation.

🟠

Likely Case

Attackers enable user registration and create multiple user accounts, potentially for spam, credential stuffing, or initial access for further attacks.

🟢

If Mitigated

If user registration is already enabled or proper monitoring is in place, impact is limited to potential spam accounts or minor configuration changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to vulnerable endpoint. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3076302/tutor/tags/2.7.0/classes/User.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Tutor LMS plugin. 4. Click 'Update Now' if available, or download version 2.7.0 from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable Tutor LMS plugin

linux

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate tutor

Web Application Firewall rule

all

Block requests to the vulnerable hide_notices function endpoint

Block HTTP POST requests to */wp-admin/admin-ajax.php with action=tutor_hide_notice

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to WordPress admin endpoints
  • Enable detailed logging and monitoring for user registration changes and admin-ajax.php requests

🔍 How to Verify

Check if Vulnerable:

Check Tutor LMS plugin version in WordPress admin panel under Plugins → Installed Plugins

Check Version:

wp plugin get tutor --field=version

Verify Fix Applied:

Verify plugin version is 2.7.0 or higher, and test that unauthenticated requests to enable user registration fail

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin-ajax.php with action=tutor_hide_notice
  • Unexpected changes to WordPress user registration settings
  • Spike in new user registrations

Network Indicators:

  • Unusual traffic patterns to WordPress admin-ajax.php endpoint from unauthenticated sources

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data="action=tutor_hide_notice")

🔗 References

📤 Share & Export