CVE-2026-3110: CWE-284 Improper Access Control in Educativa Campus
CVE-2026-3110 is an Insecure Direct Object Reference (IDOR) vulnerability in Educativa Campus version 14. 05. 00-35. It affects the endpoint responsible for exporting user data enrolled in courses via a manipulated URL parameter 'wid_cursoActual'. An unauthenticated attacker can brute-force course IDs to access sensitive user information such as usernames, full names, email addresses, and phone numbers. The vulnerability requires no authentication or user interaction and has a high CVSS score of 8. 7, indicating a severe risk. There are currently no known exploits in the wild and no official patches released. This flaw compromises confidentiality by exposing personal data and could lead to privacy violations and targeted attacks. Organizations using Educativa Campus should implement strict access controls, monitor for abnormal requests, and limit exposure of sensitive endpoints.
AI Analysis
Technical Summary
CVE-2026-3110 is a high-severity vulnerability classified under CWE-284 (Improper Access Control) found in Educativa Campus, specifically version 14.05.00-35. The vulnerability exists in the endpoint '/administracion/admin_usuarios.cgi' which handles exporting user data enrolled in courses via an XLSX file. The parameter 'wid_cursoActual' is used to specify the course ID, but it lacks proper authorization checks, allowing unauthenticated attackers to enumerate course IDs through brute-force attacks. By manipulating this parameter, attackers can retrieve sensitive personal information of users enrolled in any course, including usernames, first and last names, email addresses, and phone numbers. The vulnerability does not require authentication, user interaction, or privileges, making exploitation straightforward. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no authentication, and high confidentiality impact. Although no exploits are currently known in the wild and no patches have been published, the risk of data leakage and privacy violations is significant. This vulnerability highlights a critical failure in access control mechanisms within the Educativa Campus platform, potentially exposing large volumes of sensitive educational user data.
Potential Impact
The primary impact of CVE-2026-3110 is the unauthorized disclosure of sensitive personal data of users enrolled in courses on the Educativa Campus platform. This breach of confidentiality can lead to privacy violations, identity theft, phishing campaigns, and social engineering attacks targeting affected individuals. Educational institutions using this platform may suffer reputational damage, legal consequences under data protection regulations (such as GDPR or local privacy laws), and loss of trust from students and staff. The ease of exploitation—requiring no authentication or user interaction—means attackers can automate data harvesting at scale, potentially compromising data for all courses hosted on vulnerable instances. While the vulnerability does not directly affect system integrity or availability, the exposure of personal data is critical in educational environments where privacy is paramount. Organizations worldwide using Educativa Campus or similar systems face increased risk of targeted attacks and regulatory scrutiny if this vulnerability remains unmitigated.
Mitigation Recommendations
To mitigate CVE-2026-3110, organizations should immediately implement strict access control checks on the '/administracion/admin_usuarios.cgi' endpoint, ensuring that only authenticated and authorized users can access course user data exports. Rate limiting and anomaly detection should be applied to prevent brute-force enumeration of course IDs. If possible, disable or restrict the export functionality until a secure patch is available. Employ web application firewalls (WAFs) to detect and block suspicious URL parameter manipulation attempts. Conduct thorough code reviews and penetration testing focusing on IDOR vulnerabilities across all endpoints handling sensitive data. Educate administrators about monitoring logs for unusual access patterns related to course data exports. Coordinate with Educativa for timely patch deployment once available. Additionally, consider encrypting sensitive data at rest and in transit to reduce exposure risk. Finally, review and update privacy policies and incident response plans to prepare for potential data breach scenarios.
Affected Countries
Spain, Mexico, Argentina, Colombia, Chile, Peru, Brazil, United States
CVE-2026-3110: CWE-284 Improper Access Control in Educativa Campus
Description
CVE-2026-3110 is an Insecure Direct Object Reference (IDOR) vulnerability in Educativa Campus version 14. 05. 00-35. It affects the endpoint responsible for exporting user data enrolled in courses via a manipulated URL parameter 'wid_cursoActual'. An unauthenticated attacker can brute-force course IDs to access sensitive user information such as usernames, full names, email addresses, and phone numbers. The vulnerability requires no authentication or user interaction and has a high CVSS score of 8. 7, indicating a severe risk. There are currently no known exploits in the wild and no official patches released. This flaw compromises confidentiality by exposing personal data and could lead to privacy violations and targeted attacks. Organizations using Educativa Campus should implement strict access controls, monitor for abnormal requests, and limit exposure of sensitive endpoints.
AI-Powered Analysis
Technical Analysis
CVE-2026-3110 is a high-severity vulnerability classified under CWE-284 (Improper Access Control) found in Educativa Campus, specifically version 14.05.00-35. The vulnerability exists in the endpoint '/administracion/admin_usuarios.cgi' which handles exporting user data enrolled in courses via an XLSX file. The parameter 'wid_cursoActual' is used to specify the course ID, but it lacks proper authorization checks, allowing unauthenticated attackers to enumerate course IDs through brute-force attacks. By manipulating this parameter, attackers can retrieve sensitive personal information of users enrolled in any course, including usernames, first and last names, email addresses, and phone numbers. The vulnerability does not require authentication, user interaction, or privileges, making exploitation straightforward. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) reflects network attack vector, low complexity, no authentication, and high confidentiality impact. Although no exploits are currently known in the wild and no patches have been published, the risk of data leakage and privacy violations is significant. This vulnerability highlights a critical failure in access control mechanisms within the Educativa Campus platform, potentially exposing large volumes of sensitive educational user data.
Potential Impact
The primary impact of CVE-2026-3110 is the unauthorized disclosure of sensitive personal data of users enrolled in courses on the Educativa Campus platform. This breach of confidentiality can lead to privacy violations, identity theft, phishing campaigns, and social engineering attacks targeting affected individuals. Educational institutions using this platform may suffer reputational damage, legal consequences under data protection regulations (such as GDPR or local privacy laws), and loss of trust from students and staff. The ease of exploitation—requiring no authentication or user interaction—means attackers can automate data harvesting at scale, potentially compromising data for all courses hosted on vulnerable instances. While the vulnerability does not directly affect system integrity or availability, the exposure of personal data is critical in educational environments where privacy is paramount. Organizations worldwide using Educativa Campus or similar systems face increased risk of targeted attacks and regulatory scrutiny if this vulnerability remains unmitigated.
Mitigation Recommendations
To mitigate CVE-2026-3110, organizations should immediately implement strict access control checks on the '/administracion/admin_usuarios.cgi' endpoint, ensuring that only authenticated and authorized users can access course user data exports. Rate limiting and anomaly detection should be applied to prevent brute-force enumeration of course IDs. If possible, disable or restrict the export functionality until a secure patch is available. Employ web application firewalls (WAFs) to detect and block suspicious URL parameter manipulation attempts. Conduct thorough code reviews and penetration testing focusing on IDOR vulnerabilities across all endpoints handling sensitive data. Educate administrators about monitoring logs for unusual access patterns related to course data exports. Coordinate with Educativa for timely patch deployment once available. Additionally, consider encrypting sensitive data at rest and in transit to reduce exposure risk. Finally, review and update privacy policies and incident response plans to prepare for potential data breach scenarios.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2026-02-24T10:54:34.006Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b84a03771bdb1749186af0
Added to database: 3/16/2026, 6:20:51 PM
Last enriched: 3/16/2026, 6:26:16 PM
Last updated: 3/16/2026, 7:23:00 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.