Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Polarlearn
Polarlearn polarlearn |
|
| CPEs | cpe:2.3:a:polarlearn:polarlearn:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Plarnl
Plarnl polarlearn |
Polarlearn
Polarlearn polarlearn |
Fri, 20 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Plarnl
Plarnl polarlearn |
|
| CPEs | cpe:2.3:a:plarnl:polarlearn:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Plarnl
Plarnl polarlearn |
Mon, 02 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Polarnl
Polarnl polarlearn |
|
| Vendors & Products |
Polarnl
Polarnl polarlearn |
Thu, 29 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PolarLearn is a free and open-source learning program. Prior to version 0-PRERELEASE-15, the vote API route (`POST /api/v1/forum/vote`) trusts the JSON body’s `direction` value without runtime validation. TypeScript types are not enforced at runtime, so an attacker can send arbitrary strings (e.g., `"x"`) as `direction`. Downstream (`VoteServer`) treats any non-`"up"` and non-`null` value as a downvote and persists the invalid value in `votes_data`. This can be exploited to bypass intended business logic. Version 0-PRERELEASE-15 fixes the vulnerability. | |
| Title | PolarLearn's unvalidated vote direction allows vote count manipulation | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-02T16:34:07.949Z
Reserved: 2026-01-29T14:03:42.540Z
Link: CVE-2026-25126
Updated: 2026-01-30T14:37:07.311Z
Status : Analyzed
Published: 2026-01-29T22:15:56.423
Modified: 2026-02-20T20:46:35.787
Link: CVE-2026-25126
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:42:30Z