CVE-2020-8615
WordPress vulnerability analysis and mitigation

Overview

A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the Tutor LMS WordPress plugin versions before 1.5.3, identified as CVE-2020-8615. The vulnerability was discovered on February 4, 2020, and could allow attackers to approve themselves as instructors or perform other malicious actions such as blocking legitimate instructors (NVD, MITRE).

Technical details

The vulnerability existed because the requests for instructor approval and blocking were sent using the GET method without proper CSRF protection. An attacker could exploit this by crafting malicious URLs and tricking an authenticated admin into visiting them. The attack could be executed through URLs like 'wp-admin/admin.php?page=tutor-instructors&action=approve&instructor=8' for self-approval or 'wp-admin/admin.php?page=tutor-instructors&action=blocked&instructor=7' for blocking other instructors. Additionally, CSRF attacks could be performed on the instructor addition form (WPScan, Researcher Blog).

Impact

The vulnerability could allow attackers to gain unauthorized instructor privileges on affected WordPress sites running Tutor LMS. If the option to create courses without admin approval was enabled, attackers could potentially create courses directly. This could lead to unauthorized access to the learning management system and potential disruption of legitimate instructor activities (Themeum Blog).

Mitigation and workarounds

The vulnerability was patched in Tutor LMS version 1.5.3. The fix included adding nonce fields in the Add Instructor form and implementing proper CSRF protection for instructor approval/blocking through Ajax requests using the POST method. Users were strongly recommended to update to version 1.5.3 or later to protect against this vulnerability (Themeum Blog).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23550CRITICAL10
  • modular-connector
NoYesJan 14, 2026
CVE-2025-12166HIGH7.5
  • simply-schedule-appointments
NoYesJan 14, 2026
CVE-2026-0813MEDIUM4.4
  • short-link
NoNoJan 14, 2026
CVE-2026-0812MEDIUM4.4
  • linkedin-sc
NoNoJan 14, 2026
CVE-2026-0741MEDIUM4.4
  • electric-studio-download-counter
NoNoJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management