Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25885: CWE-285: Improper Authorization in polarnl PolarLearn

0
Critical
VulnerabilityCVE-2026-25885cvecve-2026-25885cwe-285cwe-306
Published: Mon Feb 09 2026 (02/09/2026, 21:15:33 UTC)
Source: CVE Database V5
Vendor/Project: polarnl
Product: PolarLearn

Description

CVE-2026-25885 is a critical improper authorization vulnerability in PolarLearn versions prior to 0-PRERELEASE-16. It allows unauthenticated attackers to connect to the group chat WebSocket endpoint and subscribe to or send messages to any group chat by supplying the group UUID. This flaw enables unauthorized message injection and persistent chat content manipulation without requiring login or user interaction. The vulnerability has a CVSS 4. 0 base score of 10, reflecting its high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. European organizations using PolarLearn, especially in education and training sectors, are at risk of data integrity breaches and potential disruption of collaborative environments. Mitigation requires updating to a patched version once available or implementing strict access controls and authentication on the WebSocket endpoint. Countries with significant adoption of open-source educational tools, such as Germany, France, and the Netherlands, are likely most affected. Immediate attention is warranted due to the ease of exploitation and the critical severity of this vulnerability.

AI-Powered Analysis

AILast updated: 02/09/2026, 21:45:45 UTC

Technical Analysis

CVE-2026-25885 identifies a critical improper authorization vulnerability (CWE-285) in the PolarLearn open-source learning platform, specifically affecting versions earlier than 0-PRERELEASE-16. The issue resides in the group chat WebSocket endpoint (wss://polarlearn.nl/api/v1/ws), which does not enforce authentication or authorization checks. An unauthenticated attacker can connect to this WebSocket and subscribe to any group chat by providing the group's UUID, effectively gaining read access to chat messages. Moreover, the attacker can send messages to any group chat, which the server accepts and stores persistently in the group’s chatContent. This means the attacker can inject arbitrary messages, potentially spreading misinformation, disrupting communication, or conducting social engineering attacks. The vulnerability impacts confidentiality (unauthorized read access), integrity (unauthorized message injection), and availability (potential spam or denial of service through message flooding). The CVSS 4.0 vector indicates network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability, resulting in a maximum score of 10. No patches or exploits are currently reported, but the vulnerability's nature makes it highly exploitable. The root cause is a lack of proper authorization and authentication controls on the WebSocket API, violating secure design principles for access control in real-time communication systems.

Potential Impact

For European organizations, especially educational institutions and training providers using PolarLearn, this vulnerability poses significant risks. Unauthorized access to group chats can lead to leakage of sensitive discussions, exposing personal data or intellectual property. The ability to inject messages undermines the integrity of communications, potentially causing misinformation, reputational damage, or manipulation of collaborative learning environments. Persistent storage of unauthorized messages can complicate incident response and forensic analysis. Additionally, attackers could disrupt normal operations by spamming group chats, impacting availability and user trust. Given the critical CVSS score and ease of exploitation, organizations face a high risk of data breaches and operational disruption. The impact is exacerbated in sectors with strict data protection regulations such as GDPR, where unauthorized data exposure can lead to legal and financial penalties.

Mitigation Recommendations

Immediate mitigation involves upgrading PolarLearn to a version later than 0-PRERELEASE-16 once a patch is released that enforces proper authentication and authorization on the WebSocket endpoint. Until then, organizations should implement network-level controls such as firewall rules or Web Application Firewalls (WAFs) to restrict access to the WebSocket URL to authenticated users or trusted IP ranges. Deploying reverse proxies that enforce authentication tokens or session validation before allowing WebSocket connections can also reduce exposure. Monitoring WebSocket traffic for unusual subscription patterns or message injection attempts is recommended to detect exploitation attempts early. Additionally, organizations should review and sanitize stored chat content to remove unauthorized messages and consider implementing logging and alerting for WebSocket activity. User education about potential misinformation and suspicious messages can help mitigate social engineering risks. Finally, engaging with the PolarLearn community or vendor for timely updates and patches is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-06T21:08:39.129Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a52254b57a58fa1728466

Added to database: 2/9/2026, 9:31:17 PM

Last enriched: 2/9/2026, 9:45:45 PM

Last updated: 2/10/2026, 12:31:42 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats