PolarLearn Privilege Escalation Vulnerability (CVE-2026-35610)
PolarLearn version 0-PRERELEASE-14 and earlier contains a privilege escalation vulnerability (CVE-2026-35610) in the account-management module, allowing authenticated non-admin users to execute administrative functions due to an inverted admin check.
PolarLearn, a free and open-source learning program, is vulnerable to a privilege escalation flaw (CVE-2026-35610) in versions 0-PRERELEASE-14 and earlier. The vulnerability lies within the account-management module, specifically affecting the setCustomPassword(userId, password) and deleteUser(userId) functions. An inverted admin check allows authenticated non-admin users to perform these actions, while simultaneously denying legitimate administrators the same privileges. This oversight allows malicious users to gain unauthorized control over user accounts and system configurations, leading to potential data breaches or service disruption.
Attack Chain
- Attacker authenticates to the PolarLearn application using valid, non-admin credentials.
- Attacker identifies the vulnerable
setCustomPasswordfunction within the account-management module. - Attacker crafts a malicious request to the
setCustomPasswordfunction, targeting theuserIdof an administrator account. - Due to the inverted admin check, the application incorrectly validates the attacker’s non-admin privileges as sufficient for the action.
- The application executes the
setCustomPasswordfunction, modifying the administrator’s password using the attacker’s provided value. - The attacker authenticates to the PolarLearn application using the compromised administrator credentials.
- The attacker leverages the escalated administrator privileges to access sensitive data or modify critical system settings.
- Alternatively, the attacker could exploit the
deleteUserfunction, deleting administrator or other user accounts.
Impact
Successful exploitation of CVE-2026-35610 allows unauthorized privilege escalation within PolarLearn. Non-admin users can modify administrator passwords or delete user accounts, leading to potential data breaches, service disruption, and unauthorized access to sensitive information. The vulnerability affects versions 0-PRERELEASE-14 and earlier, potentially impacting all deployments of the software within educational institutions and other organizations using PolarLearn.
Recommendation
- Upgrade PolarLearn to a patched version beyond 0-PRERELEASE-14 to remediate the vulnerability described in CVE-2026-35610.
- Implement the Sigma rule
DetectPolarLearnPrivilegeEscalationto detect exploitation attempts by monitoring calls to thesetCustomPasswordfunction made by non-admin users. - Review and audit user permissions within PolarLearn to identify and remove any unauthorized administrator accounts created through exploitation of CVE-2026-35610.
Detection coverage 2
Detect PolarLearn Privilege Escalation
highDetects attempts to exploit the PolarLearn privilege escalation vulnerability (CVE-2026-35610) by monitoring for requests to the setCustomPassword function from non-admin users.
Detect PolarLearn User Deletion Attempt by Non-Admin
highDetects attempts to exploit the PolarLearn vulnerability where non-admin users can delete accounts.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
| Type | Value |
|---|---|
| [email protected] |