Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:erudika:scoold:*:*:*:*:*:*:*:* |
Thu, 09 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Erudika
Erudika scoold |
|
| Vendors & Products |
Erudika
Erudika scoold |
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Scoold is a Q&A and a knowledge sharing platform for teams. Prior to 1.66.2, an authenticated authorization flaw in Scoold allows any logged-in, low-privilege user to overwrite another user's existing question by supplying that question's public ID as the postId parameter to POST /questions/ask. Because question IDs are exposed in normal question URLs, a low-privilege attacker can take a victim question ID from a public page and cause attacker-controlled content to be stored under that existing question object. This causes direct integrity loss of user-generated content and corrupts the integrity of the existing discussion thread. This vulnerability is fixed in 1.66.2. | |
| Title | Scoold has an Authenticated Arbitrary Question Overwrite via Client-Controlled postId in POST /questions/ask | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-09T16:17:51.713Z
Reserved: 2026-04-06T20:28:38.395Z
Link: CVE-2026-39354
Updated: 2026-04-09T15:04:57.181Z
Status : Analyzed
Published: 2026-04-07T19:16:46.357
Modified: 2026-04-10T19:29:30.457
Link: CVE-2026-39354
No data.
OpenCVE Enrichment
Updated: 2026-04-13T14:26:21Z