Critical Vulnerability in LMS Tutor Pro Plugin: What WordPress Site Owners Need to Know


Tutor LMS Pro vulnerability

A New Critical Security Threat for Tutor LMS Pro Users

WordPress site owners relying on the popular Tutor LMS Pro plugin for managing online courses should be aware of a recently discovered critical security flaw that could put sensitive website data at risk. The vulnerability, which affects all versions of Tutor LMS Pro up to and including 3.7.0, has received an 8.8/10 severity rating, underscoring its potential impact on business and educational websites.

What Is the Vulnerability?

This security issue is a time-based SQL injection, meaning it allows attackers with basic site access (such as an instructor role) to manipulate the plugin’s database queries. Exploiting this, a determined attacker could potentially extract confidential information from your WordPress database, including user details and course data. The flaw is traced to insufficient validation of user input in the plugin, specifically involving the “order” parameter in certain assignment functions.

Who Is at Risk?

The vulnerability only affects websites running Tutor LMS Pro version 3.7.0 or earlier. Importantly, an attacker must already be logged in as a legitimate user (for example, as an instructor); this makes the threat most relevant for sites with open user registration or many contributors.

How to Identify If Your Tutor LMS Pro Plugin Is Vulnerable

To check whether your Tutor LMS Pro installation is exposed to the recent critical SQL injection vulnerability (CVE-2025-6184), you should determine which version of the plugin you are running. The risk specifically affects versions up to and including 3.7.0.

Step-by-Step: Check Your Tutor LMS Pro Version

  1. Log into Your WordPress Admin Dashboard.
  2. Go to Plugins > Installed Plugins.
  3. Find Tutor LMS Pro in your plugin list.
  4. Check the version number displayed next to the plugin name.
  • If your version is 3.7.0 or below, your site is vulnerable.
  • If your version is 3.7.1 or higher, your site is protected against this specific flaw.

What If I’m Vulnerable?

If you discover that your site uses Tutor LMS Pro 3.7.0 or lower, update the plugin immediately:

  • Go to Plugins > Installed Plugins.
  • Click Update Now under Tutor LMS Pro.
  • Confirm that the new version is 3.7.1 or higher after updating.

If your site is managed by The WP Support Agency, these actions are already handled for you.

What Should You Do?

  • Update Immediately: The developers have released patch version 3.7.1 that closes this security gap. You can fix the problem by upgrading Tutor LMS Pro to 3.7.1 or higher through your WordPress dashboard.
  • Audit Your Users: Review the list of registered users and remove any that shouldn’t have access, especially anyone with instructor-level roles. Only authenticated users can exploit this vulnerability. Remove any unnecessary or suspicious accounts.
  • Monitor for Unusual Activity: Check for unexpected changes or additions to databases and user roles.
  • Practise Good Security Hygiene: Regularly update all plugins and the WordPress core, use strong passwords, and enable two-factor authentication.

WP Support Agency Clients: No Need to Worry – You Are Already Protected

If your site is managed by The WP Support Agency, you’re already safeguarded. Here’s why:

  • We deploy virtual patches for new vulnerabilities before an official patch is released, so your site is protected instantly.
  • Official updates are applied promptly as soon as they’re available – no waiting, no guessing.
  • Our hosting and maintenance includes multiple layers of security and continuous monitoring to shield your site from the full spectrum of WordPress security threats.

WP Support Agency clients can rest easy. Want to stress less about plugin vulnerabilities? Contact us today.