
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2021-24182 affects the Tutor LMS WordPress plugin versions before 1.8.3. This security flaw was discovered in the tutorquizbuildergetanswersbyquestion AJAX action functionality of the plugin, which was reported and publicly disclosed on March 15, 2021 (Wordfence Blog, WPScan).
The vulnerability is classified as a UNION-based SQL injection (CWE-89) that affects the AJAX action 'tutorquizbuildergetanswersbyquestion' in the plugin. It received a CVSS score of 6.5 (Medium), with a vector of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. The flaw could be exploited through the question_id parameter, which was not properly sanitized (Wordfence Blog, WPScan).
The SQL injection vulnerability could allow students to access unauthorized data from the WordPress database, potentially exposing sensitive information stored within the Tutor LMS plugin and the broader WordPress installation (WPScan).
The vulnerability was patched in Tutor LMS version 1.8.3. Website administrators running affected versions should update to version 1.8.3 or later to mitigate this security risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."