CVE-2026-25126

PolarLearn is a free and open-source learning program. Prior to version 0-PRERELEASE-15, the vote API route (`POST /api/v1/forum/vote`) trusts the JSON body’s `direction` value without runtime validation. TypeScript types are not enforced at runtime, so an attacker can send arbitrary strings (e.g., `"x"`) as `direction`. Downstream (`VoteServer`) treats any non-`"up"` and non-`null` value as a downvote and persists the invalid value in `votes_data`. This can be exploited to bypass intended business logic. Version 0-PRERELEASE-15 fixes the vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:polarlearn:polarlearn:-:*:*:*:*:*:*:*

History

20 Feb 2026, 20:46

Type Values Removed Values Added
CPE cpe:2.3:a:plarnl:polarlearn:-:*:*:*:*:*:*:* cpe:2.3:a:polarlearn:polarlearn:-:*:*:*:*:*:*:*
First Time Polarlearn
Polarlearn polarlearn

20 Feb 2026, 20:27

Type Values Removed Values Added
First Time Plarnl
Plarnl polarlearn
References () https://github.com/polarnl/PolarLearn/commit/e6227d94d0e53e854f6a46480db8cd1051184d41 - () https://github.com/polarnl/PolarLearn/commit/e6227d94d0e53e854f6a46480db8cd1051184d41 - Patch
References () https://github.com/polarnl/PolarLearn/security/advisories/GHSA-ghpx-5w2p-p3qp - () https://github.com/polarnl/PolarLearn/security/advisories/GHSA-ghpx-5w2p-p3qp - Exploit, Vendor Advisory
CPE cpe:2.3:a:plarnl:polarlearn:-:*:*:*:*:*:*:*

29 Jan 2026, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-29 22:15

Updated : 2026-02-20 20:46


NVD link : CVE-2026-25126

Mitre link : CVE-2026-25126

CVE.ORG link : CVE-2026-25126


JSON object : View

Products Affected

polarlearn

  • polarlearn
CWE
CWE-20

Improper Input Validation