Description
MarkUs is a web application for the submission and grading of student assignments. Prior to 2.9.1, the courses/<:course_id>/assignments/<:assignment_id>/submissions/html_content accepted a select_file_id parameter to serve SubmissionFile objects containing a record of files submitted by students. This parameter was not correctly scoped to the requesting user, allowing users access arbitrary submission file contents by id. This vulnerability is fixed in 2.9.1.
Published: 2026-02-09
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Disclosure of Student Submissions via IDOR
Action: Patch
AI Analysis

Impact

A flawed parameter handling in the submission viewing endpoint allowed any authenticated user to request files belonging to other students, resulting in unauthorized access to potentially sensitive academic work. The weakness originates from an improper scope check on the select_file_id parameter, permitting arbitrary file content retrieval without verifying ownership or course enrollment. Consequently, confidentiality of all submissions is exposed to any user who can use the vulnerable endpoint.

Affected Systems

The MarkUs web application, specifically any installation of MarkUsProject:Markus before the 2.9.1 release, is affected. These versions lack the fix that properly scopes file access to the requesting user, thus enabling the described exploit.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity, meaning the vulnerability could be leveraged by any authenticated user. However, the EPSS score of less than 1% suggests low current exploit probability, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires only the ability to send a crafted request containing a valid file ID, which can be done through the web browser or via automated scripts by any user logged into the system. No additional privileges or code execution are necessary; the impact is strictly information disclosure.

Generated by OpenCVE AI on April 18, 2026 at 13:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MarkUs to version 2.9.1 or newer where the IDOR issue has been fixed.
  • Review deployment to ensure no older MarkUs instances remain exposed.
  • Verify that users cannot guess or enumerate file IDs by testing endpoint access with random identifiers.

Generated by OpenCVE AI on April 18, 2026 at 13:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:markusproject:markus:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Markusproject
Markusproject markus
Vendors & Products Markusproject
Markusproject markus

Mon, 09 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
Description MarkUs is a web application for the submission and grading of student assignments. Prior to 2.9.1, the courses/<:course_id>/assignments/<:assignment_id>/submissions/html_content accepted a select_file_id parameter to serve SubmissionFile objects containing a record of files submitted by students. This parameter was not correctly scoped to the requesting user, allowing users access arbitrary submission file contents by id. This vulnerability is fixed in 2.9.1.
Title MarkUs has a submission-view IDOR exposes all student submissions
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Markusproject Markus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-10T16:01:21.289Z

Reserved: 2026-01-27T19:35:20.529Z

Link: CVE-2026-24900

cve-icon Vulnrichment

Updated: 2026-02-10T15:30:27.490Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T20:15:56.387

Modified: 2026-02-19T20:08:14.250

Link: CVE-2026-24900

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses