Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3111: CWE-284 Improper Access Control in Educativa Campus

0
Medium
VulnerabilityCVE-2026-3111cvecve-2026-3111cwe-284
Published: Mon Mar 16 2026 (03/16/2026, 09:37:48 UTC)
Source: CVE Database V5
Vendor/Project: Educativa
Product: Campus

Description

Insecure Direct Object Reference (IDOR) vulnerability in Campus Educativa specifically at the endpoint '/archivos/usuarios/[ID]/[username]/thumb_AAxAA.jpg' (translated as 80x90 and 40x45). Successful exploitation of this vulnerability could allow an unauthenticated attacker to access the profile photos of all users via a manipulated URL, enabling them to collect user photos en masse. This could lead to these photos being used maliciously to impersonate identities, perform social engineering, link identities across platforms using facial recognition, or even carry out doxxing.

AI-Powered Analysis

AILast updated: 03/16/2026, 18:26:34 UTC

Technical Analysis

CVE-2026-3111 is a medium severity vulnerability classified under CWE-284 (Improper Access Control) affecting Educativa Campus, specifically version 14.05.00-35. The vulnerability arises from an Insecure Direct Object Reference (IDOR) at the endpoint '/archivos/usuarios/[ID]/[username]/thumb_AAxAA.jpg', which serves user profile photos in two sizes (80x90 and 40x45). Due to insufficient access control checks, an unauthenticated attacker can manipulate the URL parameters (user ID and username) to retrieve profile photos of any user without authorization. This flaw does not require any authentication or user interaction, making it trivially exploitable remotely over the network. The exposed photos can be collected en masse, enabling attackers to perform malicious activities such as identity impersonation, social engineering attacks, linking identities across different platforms using facial recognition technologies, or doxxing individuals by correlating their images with other personal data. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation pose a significant privacy risk. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and limited confidentiality impact (exposure of photos only). The vulnerability affects only the specified version, and no patches or mitigations have been officially published at the time of disclosure.

Potential Impact

The primary impact of CVE-2026-3111 is the unauthorized disclosure of user profile photos, which compromises user privacy and can facilitate further attacks. Organizations using Educativa Campus version 14.05.00-35 risk mass leakage of sensitive biometric data (user images), which can be exploited for identity theft, social engineering, and doxxing. This can damage user trust and lead to reputational harm, especially for educational institutions managing sensitive student and staff data. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can have cascading effects, including targeted phishing campaigns or harassment. The ease of exploitation without authentication increases the likelihood of automated scraping attacks. Organizations may also face regulatory compliance issues related to data protection laws such as GDPR or CCPA if personal data is exposed. The impact is particularly critical for institutions with large user bases or those in regions with strict privacy regulations.

Mitigation Recommendations

To mitigate CVE-2026-3111, organizations should immediately implement strict access control checks on the '/archivos/usuarios/[ID]/[username]/thumb_AAxAA.jpg' endpoint to ensure only authorized users can access profile photos. This includes validating the requesting user's identity and permissions before serving images. Employing token-based or session-based authentication mechanisms to restrict access is essential. Additionally, rate limiting and anomaly detection can help identify and block automated scraping attempts. Organizations should monitor access logs for suspicious URL manipulation patterns. If possible, temporarily disabling public access to profile photos until a patch is available can reduce exposure. Educativa should be contacted to obtain or request an official patch or update addressing this vulnerability. User awareness campaigns about phishing and social engineering risks related to exposed images can also reduce downstream impact. Finally, consider implementing privacy-preserving measures such as watermarking images or limiting photo resolution to reduce misuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2026-02-24T10:54:35.705Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b84a05771bdb1749186bd3

Added to database: 3/16/2026, 6:20:53 PM

Last enriched: 3/16/2026, 6:26:34 PM

Last updated: 3/16/2026, 7:42:23 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses