Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26744: n/a

0
Medium
VulnerabilityCVE-2026-26744cvecve-2026-26744
Published: Thu Feb 19 2026 (02/19/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A user enumeration vulnerability exists in FormaLMS 4.1.18 and below in the password recovery functionality accessible via the /lostpwd endpoint. The application returns different error messages for valid and invalid usernames allowing an unauthenticated attacker to determine which usernames are registered in the system through observable response discrepancy.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:44:13 UTC

Technical Analysis

CVE-2026-26744 identifies a user enumeration vulnerability in FormaLMS, an open-source learning management system widely used for corporate and educational training. The vulnerability exists in the password recovery functionality accessible via the /lostpwd endpoint. When an attacker submits a username during password recovery, the application responds differently depending on whether the username exists in the system. This discrepancy in error messages allows an unauthenticated attacker to confirm valid usernames by observing the response differences. The vulnerability is classified under CWE-204 (Information Exposure Through Discrepancy). The CVSS 3.1 base score is 5.3, reflecting a medium severity level, with an attack vector of network (remote), no privileges required, and no user interaction needed. The impact is limited to confidentiality as only username information is disclosed; integrity and availability are unaffected. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. However, the vulnerability facilitates reconnaissance activities that can serve as a precursor to more severe attacks such as phishing, social engineering, or brute force password attacks. Organizations using FormaLMS 4.1.18 or earlier should be aware of this issue and monitor for updates or apply custom mitigations to reduce information leakage.

Potential Impact

The primary impact of this vulnerability is the exposure of valid usernames to unauthenticated attackers. This information leakage compromises confidentiality by enabling attackers to build accurate user lists, which can be leveraged in targeted phishing campaigns, credential stuffing attacks, or brute force attempts to gain unauthorized access. While the vulnerability does not directly affect system integrity or availability, the resulting attacks facilitated by user enumeration can lead to account compromise, data breaches, and potential lateral movement within affected organizations. Educational institutions, corporate training departments, and other organizations relying on FormaLMS for user management and training delivery are at risk of having their user data exposed, potentially undermining trust and compliance with data protection regulations. The ease of exploitation and lack of required authentication increase the likelihood of reconnaissance activities by malicious actors.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first check for and apply any official patches or updates from FormaLMS that address the user enumeration issue. In the absence of an official patch, administrators can implement the following practical measures: 1) Standardize error messages in the password recovery process so that responses do not differ based on username validity, thereby preventing attackers from distinguishing valid users. 2) Implement rate limiting and IP throttling on the /lostpwd endpoint to reduce the feasibility of automated enumeration attempts. 3) Employ web application firewalls (WAFs) with rules designed to detect and block enumeration patterns targeting password recovery endpoints. 4) Monitor logs for unusual activity related to password recovery requests, especially repeated attempts with varying usernames. 5) Educate users about phishing risks and encourage strong, unique passwords combined with multi-factor authentication (MFA) to reduce the impact of compromised credentials. 6) Consider temporarily disabling the password recovery feature if it is not essential or replacing it with more secure alternatives. These steps collectively reduce the risk of information leakage and subsequent attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69978157d7880ec89b34978e

Added to database: 2/19/2026, 9:32:07 PM

Last enriched: 2/28/2026, 12:44:13 PM

Last updated: 4/5/2026, 12:47:58 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses