Description
An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies
Published: 2026-02-25
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Patch
AI Analysis

Impact

The vulnerability resides in the HMAC signature verification in the sync_course_run_from_request function of OpenFUN Richie LMS. A non‑constant‑time comparison operator is used, which permits an attacker to measure response times and deduce a correct signature. With a forged signature the attacker can bypass authentication and perform actions that are normally restricted to authenticated users.

Affected Systems

This flaw affects deployments of OpenFUN Richie LMS where the sync_course_run_from_request endpoint is enabled. The specific code path is located in src/richie/apps/courses/api.py. A remediation commit (a1b5bbda3403d7debb466c303a32852925fcba5f) has been released to replace the comparison with a constant‑time routine. No affected version information is available.

Risk and Exploitability

The CVSS score is 4.8, representing a medium severity issue, while the EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote over a network, requiring an attacker to sacrifice a request to the sync_course_run_from_request endpoint to time the response and forge a valid HMAC. This allows unauthorized access to protected resources or actions within the LMS. The likelihood of exploitation is low according to current metrics, but the impact of bypassing authentication warrants timely resolution.

Generated by OpenCVE AI on April 18, 2026 at 10:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch introduced in commit a1b5bbda3403d7debb466c303a32852925fcba5f to use a constant‑time comparison for HMAC verification.
  • If the patch cannot be applied immediately, disable or restrict the sync_course_run_from_request endpoint to prevent unauthenticated access.
  • Review and enforce strict access controls on all API endpoints that rely on HMAC signatures, ensuring that only legitimate requests are processed.
  • Regularly audit authentication mechanisms to detect and remediate any timing variations in future updates.

Generated by OpenCVE AI on April 18, 2026 at 10:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xjhr-fm27-4hmx OpenFUN Richie Observable Timing Discrepancy in its sync_course_run_from_request function
History

Sat, 18 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Title HMAC Timing Attack Enabling Signature Forgery in OpenFUN Richie LMS

Fri, 27 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-208
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Openfun
Openfun richie
Vendors & Products Openfun
Openfun richie

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-26T19:11:04.934Z

Reserved: 2026-02-16T00:00:00.000Z

Link: CVE-2026-26717

cve-icon Vulnrichment

Updated: 2026-02-26T19:05:51.701Z

cve-icon NVD

Status : Deferred

Published: 2026-02-25T17:25:39.293

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-26717

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:00:05Z

Weaknesses