Home

Description

PolarLearn is a free and open-source learning program. Prior to version 0-PRERELEASE-15, the vote API route (`POST /api/v1/forum/vote`) trusts the JSON body’s `direction` value without runtime validation. TypeScript types are not enforced at runtime, so an attacker can send arbitrary strings (e.g., `"x"`) as `direction`. Downstream (`VoteServer`) treats any non-`"up"` and non-`null` value as a downvote and persists the invalid value in `votes_data`. This can be exploited to bypass intended business logic. Version 0-PRERELEASE-15 fixes the vulnerability.

PUBLISHED Reserved 2026-01-29 | Published 2026-01-29 | Updated 2026-01-29 | Assigner GitHub_M




HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

Problem types

CWE-20: Improper Input Validation

Product status

< 0-PRERELEASE-15
affected

References

github.com/...rLearn/security/advisories/GHSA-ghpx-5w2p-p3qp

github.com/...ommit/e6227d94d0e53e854f6a46480db8cd1051184d41

cve.org (CVE-2026-25126)

nvd.nist.gov (CVE-2026-25126)

Download JSON