Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xjhr-fm27-4hmx | OpenFUN Richie Observable Timing Discrepancy in its sync_course_run_from_request function |
Sat, 18 Apr 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | HMAC Timing Attack Enabling Signature Forgery in OpenFUN Richie LMS |
Fri, 27 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-208 | |
| Metrics |
cvssV3_1
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openfun
Openfun richie |
|
| Vendors & Products |
Openfun
Openfun richie |
Wed, 25 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-26T19:11:04.934Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26717
Updated: 2026-02-26T19:05:51.701Z
Status : Deferred
Published: 2026-02-25T17:25:39.293
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-26717
No data.
OpenCVE Enrichment
Updated: 2026-04-18T11:00:05Z
Github GHSA