CVE-2026-0953
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to log in as any existing user, including administrators, by using a valid OAuth token from their own account and the victim's email address. The issue arises because the plugin does not properly check if the email matches the one linked to the OAuth token, making it easy for unauthenticated users to bypass login security.
Technical Description
The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.9.5 via the Social Login addon. This is due to the plugin failing to verify that the email provided in the authentication request matches the email from the validated OAuth token. This makes it possible for unauthenticated attackers to log in as any existing user, including administrators, by supplying a valid OAuth token from their own account along with the victim's email address.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 10, 2026
28 days ago
Last Modified
Mar 11, 2026
28 days ago