Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 16 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Polarlearn
Polarlearn polarlearn |
|
| CPEs | cpe:2.3:a:polarlearn:polarlearn:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Polarlearn
Polarlearn polarlearn |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Polarnl
Polarnl polarlearn |
|
| Vendors & Products |
Polarnl
Polarnl polarlearn |
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PolarLearn is a free and open-source learning program. In 0-PRERELEASE-14 and earlier, setCustomPassword(userId, password) and deleteUser(userId) in the account-management module used an inverted admin check. Because of the inverted condition, authenticated non-admin users were allowed to execute both actions, while real admins were rejected. This is a direct privilege-escalation issue in the application. | |
| Title | PolarLearn has a Server Action Admin Bypass in Account Management Actions | |
| Weaknesses | CWE-285 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T18:32:36.607Z
Reserved: 2026-04-03T21:25:12.163Z
Link: CVE-2026-35610
No data.
Status : Analyzed
Published: 2026-04-07T17:16:35.260
Modified: 2026-04-16T18:04:50.313
Link: CVE-2026-35610
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:47:35Z