Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Critical Auth Bypass in Tutor LMS Pro Exposes 30,000+
Critical Auth Bypass in Tutor LMS Pro Exposes 30,000+

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-0953

Critical Auth Bypass in Tutor LMS Pro Exposes 30,000+

The Tutor LMS Pro WordPress plugin's Social Login addon fails to verify OAuth token email matches the login request, allowing unauthenticated attackers to...

Dylan H.

Security Team

March 11, 2026
6 min read

Affected Products

  • Tutor LMS Pro WordPress Plugin <= 3.9.5

Executive Summary

A critical authentication bypass vulnerability (CVE-2026-0953) has been discovered in the Tutor LMS Pro plugin for WordPress, affecting over 30,000 active installations. The flaw resides in the plugin's Social Login addon and carries a CVSS score of 9.8 — the second-highest possible rating.

The vulnerability allows an unauthenticated attacker to bypass authentication entirely and log in as any registered user, including site administrators. The root cause is a failure to validate that the email address submitted in a social login request matches the email associated with the verified OAuth token.

Organizations running Tutor LMS Pro version 3.9.5 or earlier with the Social Login feature enabled should update to version 3.9.6 immediately or disable the Social Login addon until patched.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-0953
CVSS Score9.8 (Critical)
CWECWE-287 — Improper Authentication
TypeAuthentication Bypass / Account Takeover
Attack VectorNetwork
Privileges RequiredNone (unauthenticated)
User InteractionNone
ScopeChanged
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
Patch AvailableYes — version 3.9.6+

Affected Versions

PluginAffected VersionsFixed Version
Tutor LMS Pro<= 3.9.5 (all, with Social Login enabled)3.9.6

Technical Analysis

Root Cause

The Tutor LMS Pro Social Login addon integrates with OAuth providers (Google, Facebook, etc.) to allow users to sign in via social accounts. During the authentication flow, the plugin receives an OAuth token from the provider along with a user-supplied email address.

The critical flaw: the plugin does not verify that the email in the login request matches the email encoded within the validated OAuth token.

An attacker can therefore:

  1. Obtain a valid OAuth token for their own social account
  2. Submit that token alongside a different user's email (e.g., the site admin's email)
  3. The plugin validates the OAuth token as legitimate, then authenticates the request as the email-specified user — without any cross-check

This is a classic OAuth token/email mismatch vulnerability.

Attack Flow

1. Attacker creates a social account (e.g., Google) and obtains a valid OAuth token
2. Attacker enumerates or guesses admin/user email address on target WordPress site
3. Attacker sends crafted social login POST request:
   - oauth_token: [attacker's valid token]
   - email: [victim's email, e.g., admin@targetsite.com]
4. Plugin validates OAuth token signature — token is valid (it's the attacker's own)
5. Plugin retrieves WordPress user by the supplied email — returns admin account
6. Plugin creates authenticated session for admin — no password required
7. Attacker is logged in as site administrator with full WordPress control

Exploitation Conditions

  • Tutor LMS Pro version 3.9.5 or earlier must be installed and active
  • The Social Login addon must be enabled (default in most Tutor LMS Pro installations)
  • The attacker needs a valid OAuth token from any supported provider (trivial to obtain)
  • The attacker needs a valid email address registered on the site (can be guessed, found in leaks, or via WP user enumeration)

Impact Assessment

Impact AreaDescription
Full Account TakeoverAttacker can log in as any user, including administrators
Site DefacementAdmin access enables theme, plugin, and content modification
Data ExfiltrationAccess to student PII, course data, payment records, and user profiles
Malware InstallationAdmin can install malicious plugins or modify PHP files
Credential HarvestingAccess to stored payment methods, OAuth tokens, email addresses
Persistent BackdoorAttacker can create new admin accounts for persistent access
Hosting PivotShared-hosting compromise can expand to other hosted sites

Immediate Remediation

Step 1: Update Tutor LMS Pro to 3.9.6

# Via WP-CLI
wp plugin update tutor-pro
 
# Verify installed version
wp plugin get tutor-pro --field=version
# Expected: 3.9.6 or higher

Or update through the WordPress admin panel: Plugins > Installed Plugins > Tutor LMS Pro > Update Now.

Step 2: Disable Social Login if Update Is Not Immediately Possible

  1. Navigate to WordPress Admin > Tutor LMS > Settings > Addons
  2. Locate Social Login
  3. Toggle OFF and save settings

Alternatively, deactivate the entire Tutor LMS Pro plugin if the site does not depend on it critically.

Step 3: Audit for Compromise

# Check for recently created admin accounts
wp user list --role=administrator --fields=user_login,user_email,user_registered
 
# Review recent login events (if audit log plugin is active)
wp db query "SELECT user_login, user_email, user_registered FROM wp_users WHERE user_registered > DATE_SUB(NOW(), INTERVAL 7 DAY);"
 
# Search for recently modified PHP files (potential backdoors)
find /path/to/wordpress/ -name "*.php" -newer /path/to/wordpress/wp-includes/version.php -not -path "*/cache/*" -type f
 
# Check active plugins for unauthorized additions
wp plugin list --status=active

Step 4: Harden WordPress Authentication

# Force password reset for all administrator accounts
wp user list --role=administrator --format=ids | xargs -I {} wp user update {} --user_pass="$(openssl rand -base64 24)"
 
# Regenerate WordPress secret keys
wp config shuffle-salts
 
# Invalidate all existing sessions
wp db query "DELETE FROM wp_usermeta WHERE meta_key = 'session_tokens';"

Detection Indicators

IndicatorDescription
New admin accounts created recentlyAttacker-created persistence accounts
Social login requests with mismatched email/tokenExploitation attempt in access logs
Unexpected file modifications in wp-content/Post-exploitation backdoor installation
Admin login events from unfamiliar IPsAccount takeover in use
New plugins or theme edits from unfamiliar sessionsActive post-compromise activity

Post-Remediation Checklist

  1. Update Tutor LMS Pro to version 3.9.6 or later
  2. Disable Social Login addon until patched if update is delayed
  3. Audit all administrator accounts — remove any unauthorized entries
  4. Reset all admin passwords and regenerate WordPress secret keys
  5. Invalidate all active sessions to force re-authentication
  6. Scan for webshells and backdoors in wp-content/ directory
  7. Review access logs for evidence of prior exploitation
  8. Enable two-factor authentication on all administrator accounts
  9. Deploy a WAF (Wordfence, Sucuri, Cloudflare) with WordPress rule sets
  10. Monitor for re-exploitation until patch is confirmed applied

References

  • NVD — CVE-2026-0953
  • Malware News — 30,000 WordPress Sites Affected by Tutor LMS Pro Auth Bypass
  • Managed-WP — Mitigating Broken Authentication in Tutor LMS Pro
  • OffSeq Threat Radar — CVE-2026-0953 Intelligence
  • Vulnerability Lookup — CVE-2026-0953
#CVE-2026-0953#WordPress#Tutor LMS#Authentication Bypass#OAuth#Account Takeover#eLearning

Related Articles

CVE-2026-3629: WordPress User Import Plugin Privilege Escalation

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to 1.29.7, allowing authenticated...

5 min read

CVE-2026-25449: Critical Object Injection in Shinetheme Traveler WordPress Plugin

A CVSS 9.8 deserialization vulnerability in the Shinetheme Traveler WordPress plugin allows unauthenticated remote attackers to inject arbitrary PHP...

6 min read

CVE-2026-3564: ConnectWise ScreenConnect Auth Bypass via Server Cryptographic Material

A critical authentication bypass vulnerability (CVSS 9.0) in ConnectWise ScreenConnect versions prior to 26.1 allows an actor with access to server-level...

3 min read
Back to all Security Alerts