PolarLearn is a free and open-source learning program. Prior to version 0-PRERELEASE-15, the vote API route (`POST /api/v1/forum/vote`) trusts the JSON body’s `direction` value without runtime validation. TypeScript types are not enforced at runtime, so an attacker can send arbitrary strings (e.g., `"x"`) as `direction`. Downstream (`VoteServer`) treats any non-`"up"` and non-`null` value as a downvote and persists the invalid value in `votes_data`. This can be exploited to bypass intended business logic. Version 0-PRERELEASE-15 fixes the vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/polarnl/PolarLearn/commit/e6227d94d0e53e854f6a46480db8cd1051184d41 | Patch |
| https://github.com/polarnl/PolarLearn/security/advisories/GHSA-ghpx-5w2p-p3qp | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-29 22:15
Updated : 2026-02-20 20:46
NVD link : CVE-2026-25126
Mitre link : CVE-2026-25126
CVE.ORG link : CVE-2026-25126
JSON object : View
Products Affected
polarlearn
- polarlearn
CWE
CWE-20
Improper Input Validation
