Home

Description

OpenLearnX is an open-source, decentralized learning and assessment platform. Prior to version 2.0.3, a remote code execution (RCE) vulnerability was identified in the OpenLearnX code execution environment, allowing sandbox escape and arbitrary command execution. This issue has been patched in version 2.0.3.

PUBLISHED Reserved 2026-04-22 | Published 2026-05-08 | Updated 2026-05-08 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-94: Improper Control of Generation of Code ('Code Injection')

CWE-250: Execution with Unnecessary Privileges

CWE-284: Improper Access Control

CWE-693: Protection Mechanism Failure

Product status

< 2.0.3
affected

References

github.com/...LearnX/security/advisories/GHSA-8h25-q488-4hxw

github.com/...ommit/14765d7d1856d564747c55c5412e2f38feab079e

github.com/...4y/OpenLearnX/releases/tag/v2.0.3-security-fix

cve.org (CVE-2026-41900)

nvd.nist.gov (CVE-2026-41900)

Download JSON