PolarLearn is a free and open-source learning program. Prior to version 0-PRERELEASE-15, the vote API route (`POST /api/v1/forum/vote`) trusts the JSON body’s `direction` value without runtime validation. TypeScript types are not enforced at runtime, so an attacker can send arbitrary strings (e.g., `"x"`) as `direction`. Downstream (`VoteServer`) treats any non-`"up"` and non-`null` value as a downvote and persists the invalid value in `votes_data`. This can be exploited to bypass intended business logic. Version 0-PRERELEASE-15 fixes the vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/polarnl/PolarLearn/commit/e6227d94d0e53e854f6a46480db8cd1051184d41 | Patch |
| https://github.com/polarnl/PolarLearn/security/advisories/GHSA-ghpx-5w2p-p3qp | Exploit Vendor Advisory |
Configurations
History
20 Feb 2026, 20:46
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:polarlearn:polarlearn:-:*:*:*:*:*:*:* | |
| First Time |
Polarlearn
Polarlearn polarlearn |
20 Feb 2026, 20:27
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Plarnl
Plarnl polarlearn |
|
| References | () https://github.com/polarnl/PolarLearn/commit/e6227d94d0e53e854f6a46480db8cd1051184d41 - Patch | |
| References | () https://github.com/polarnl/PolarLearn/security/advisories/GHSA-ghpx-5w2p-p3qp - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:plarnl:polarlearn:-:*:*:*:*:*:*:* |
29 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-29 22:15
Updated : 2026-02-20 20:46
NVD link : CVE-2026-25126
Mitre link : CVE-2026-25126
CVE.ORG link : CVE-2026-25126
JSON object : View
Products Affected
polarlearn
- polarlearn
CWE
CWE-20
Improper Input Validation
