Tutor LMS Pro Vulnerability (High) – CVE-2026-22332

Tutor LMS Pro Vulnerability (High) – CVE-2026-22332

by | Apr 15, 2026 | Plugins

Attack Vectors

Tutor LMS Pro (slug: tutor-pro) versions up to and including 3.9.6 are affected by CVE-2026-22332, a High severity vulnerability (CVSS 7.5; vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

This issue is an unauthenticated SQL Injection, meaning an attacker can target your site over the internet without needing a username, password, or any user interaction. The vulnerability stems from a user-supplied parameter not being sufficiently escaped and the SQL query not being properly prepared, allowing attackers to append SQL to existing queries and potentially extract sensitive database information.

Public reference: CVE-2026-22332 record. Vendor/community tracking and remediation guidance: Wordfence vulnerability advisory.

Security Weakness

The core weakness is a failure to safely handle untrusted input in database queries. In practical terms, the plugin’s handling of a user-controlled parameter allows an attacker to manipulate a database query because the input is not adequately escaped and the query is not sufficiently prepared.

Because the vulnerability is unauthenticated, it increases exposure and reduces the attacker’s effort: there is no need to compromise an account first. This elevates business risk, especially for sites that store customer details, order records, student information, email addresses, or other sensitive data in the WordPress database.

Technical or Business Impacts

The stated impact of this vulnerability is potential data exposure from the WordPress database (consistent with the CVSS rating showing High confidentiality impact). Depending on what your site stores, this could include customer and lead contact data, user account metadata, course/student information, and other records that support marketing operations and revenue workflows.

For business owners and compliance teams, the downstream risks may include breach notification obligations, regulatory scrutiny, contractual issues (e.g., client DPAs), reputational damage, and disruption to marketing operations if data integrity and customer trust are affected. Even if no payment data is stored, exposed personal data can still create material privacy and brand risk.

Remediation: Update Tutor LMS Pro to version 3.9.7 or newer (patched). After updating, validate that the plugin version is correct across all environments (production and staging) and monitor logs for unusual request patterns that could indicate probing or exploitation attempts.

Similar Attacks

SQL injection is a long-standing and widely exploited class of web vulnerability. Real-world incidents tied to SQL injection (or closely related injection issues) include:

Equifax breach (2017) (public incident information) is frequently cited in risk discussions about web application vulnerabilities leading to major data exposure.

U.S. Department of Justice: sentencing related to large-scale theft of personal information from hacked websites (examples often involve exploitation of common web application weaknesses, including injection).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers