Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3110: CWE-284 Improper Access Control in Educativa Campus

0
High
VulnerabilityCVE-2026-3110cvecve-2026-3110cwe-284
Published: Mon Mar 16 2026 (03/16/2026, 09:36:17 UTC)
Source: CVE Database V5
Vendor/Project: Educativa
Product: Campus

Description

CVE-2026-3110 is an Insecure Direct Object Reference (IDOR) vulnerability in Educativa Campus version 14. 05. 00-35. It affects the endpoint responsible for exporting user data enrolled in courses via a manipulated URL parameter 'wid_cursoActual'. An unauthenticated attacker can brute-force course IDs to access sensitive user information such as usernames, full names, email addresses, and phone numbers. The vulnerability requires no authentication or user interaction and has a high CVSS score of 8. 7, indicating a severe risk. There are currently no known exploits in the wild and no official patches released. This flaw compromises confidentiality by exposing personal data and could lead to privacy violations and targeted attacks. Organizations using Educativa Campus should implement strict access controls, monitor for abnormal requests, and limit exposure of sensitive endpoints.

AI-Powered Analysis

AILast updated: 03/16/2026, 18:26:16 UTC

Technical Analysis

CVE-2026-3110 is a high-severity vulnerability classified under CWE-284 (Improper Access Control) found in Educativa Campus, specifically version 14.05.00-35. The vulnerability exists in the endpoint '/administracion/admin_usuarios.cgi' which handles exporting user data enrolled in courses via an XLSX file. The parameter 'wid_cursoActual' is used to specify the course ID, but it lacks proper authorization checks, allowing unauthenticated attackers to enumerate course IDs through brute-force attacks. By manipulating this parameter, attackers can retrieve sensitive personal information of users enrolled in any course, including usernames, first and last names, email addresses, and phone numbers. The vulnerability does not require authentication, user interaction, or privileges, making exploitation straightforward. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no authentication, and high confidentiality impact. Although no exploits are currently known in the wild and no patches have been published, the risk of data leakage and privacy violations is significant. This vulnerability highlights a critical failure in access control mechanisms within the Educativa Campus platform, potentially exposing large volumes of sensitive educational user data.

Potential Impact

The primary impact of CVE-2026-3110 is the unauthorized disclosure of sensitive personal data of users enrolled in courses on the Educativa Campus platform. This breach of confidentiality can lead to privacy violations, identity theft, phishing campaigns, and social engineering attacks targeting affected individuals. Educational institutions using this platform may suffer reputational damage, legal consequences under data protection regulations (such as GDPR or local privacy laws), and loss of trust from students and staff. The ease of exploitation—requiring no authentication or user interaction—means attackers can automate data harvesting at scale, potentially compromising data for all courses hosted on vulnerable instances. While the vulnerability does not directly affect system integrity or availability, the exposure of personal data is critical in educational environments where privacy is paramount. Organizations worldwide using Educativa Campus or similar systems face increased risk of targeted attacks and regulatory scrutiny if this vulnerability remains unmitigated.

Mitigation Recommendations

To mitigate CVE-2026-3110, organizations should immediately implement strict access control checks on the '/administracion/admin_usuarios.cgi' endpoint, ensuring that only authenticated and authorized users can access course user data exports. Rate limiting and anomaly detection should be applied to prevent brute-force enumeration of course IDs. If possible, disable or restrict the export functionality until a secure patch is available. Employ web application firewalls (WAFs) to detect and block suspicious URL parameter manipulation attempts. Conduct thorough code reviews and penetration testing focusing on IDOR vulnerabilities across all endpoints handling sensitive data. Educate administrators about monitoring logs for unusual access patterns related to course data exports. Coordinate with Educativa for timely patch deployment once available. Additionally, consider encrypting sensitive data at rest and in transit to reduce exposure risk. Finally, review and update privacy policies and incident response plans to prepare for potential data breach scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2026-02-24T10:54:34.006Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b84a03771bdb1749186af0

Added to database: 3/16/2026, 6:20:51 PM

Last enriched: 3/16/2026, 6:26:16 PM

Last updated: 3/16/2026, 7:23:00 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses