Home

Description

MarkUs is a web application for the submission and grading of student assignments. Prior to 2.9.1, the courses/<:course_id>/assignments/<:assignment_id>/submissions/html_content accepted a select_file_id parameter to serve SubmissionFile objects containing a record of files submitted by students. This parameter was not correctly scoped to the requesting user, allowing users access arbitrary submission file contents by id. This vulnerability is fixed in 2.9.1.

PUBLISHED Reserved 2026-01-27 | Published 2026-02-09 | Updated 2026-02-10 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-639: Authorization Bypass Through User-Controlled Key

Product status

< 2.9.1
affected

References

github.com/...Markus/security/advisories/GHSA-56gh-8hmq-7q88

github.com/...ommit/7daed9fd2d44932223798d997b55094a3bff104b

github.com/MarkUsProject/Markus/releases/tag/v2.9.1

cve.org (CVE-2026-24900)

nvd.nist.gov (CVE-2026-24900)

Download JSON