CVE-2026-25221

HIGH
2026-02-02 [email protected]
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 22:01 vuln.today
PoC Detected
Feb 20, 2026 - 20:45 vuln.today
Public exploit code
Patch Released
Feb 20, 2026 - 20:45 nvd
Patch available
CVE Published
Feb 02, 2026 - 23:16 nvd
HIGH 8.1

Description

PolarLearn is a free and open-source learning program. In 0-PRERELEASE-15 and earlier, the OAuth 2.0 implementation for GitHub and Google login providers is vulnerable to Login Cross-Site Request Forgery (CSRF). The application fails to implement and verify the state parameter during the authentication flow. This allows an attacker to pre-authenticate a session and trick a victim into logging into the attacker's account. Any data the victim then enters or academic progress they make is stored on the attacker's account, leading to data loss for the victim and information disclosure to the attacker.

Analysis

PolarLearn versions 0-PRERELEASE-15 and earlier lack proper state parameter validation in OAuth 2.0 authentication, enabling attackers to conduct login CSRF attacks against GitHub and Google login flows. An attacker can pre-authenticate a victim's session and trick them into logging into the attacker's account, causing the victim's data and academic progress to be stored on the attacker's account instead. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all PolarLearn deployments and versions in use; notify users of the vulnerability and advise temporary password changes. Within 7 days: Apply the available vendor patch to all PolarLearn instances and validate the update in a test environment first. …

Sign in for detailed remediation steps.

Priority Score

61
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +40
POC: +20

Share

CVE-2026-25221 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy