<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-35610 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-35610/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 17:16:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-35610/feed.xml" rel="self" type="application/rss+xml"/><item><title>PolarLearn Privilege Escalation Vulnerability (CVE-2026-35610)</title><link>https://feed.craftedsignal.io/briefs/2026-04-polar-learn-privesc/</link><pubDate>Tue, 07 Apr 2026 17:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-polar-learn-privesc/</guid><description>PolarLearn version 0-PRERELEASE-14 and earlier contains a privilege escalation vulnerability (CVE-2026-35610) in the account-management module, allowing authenticated non-admin users to execute administrative functions due to an inverted admin check.</description><content:encoded><![CDATA[<p>PolarLearn, a free and open-source learning program, is vulnerable to a privilege escalation flaw (CVE-2026-35610) in versions 0-PRERELEASE-14 and earlier. The vulnerability lies within the account-management module, specifically affecting the <code>setCustomPassword(userId, password)</code> and <code>deleteUser(userId)</code> functions. An inverted admin check allows authenticated non-admin users to perform these actions, while simultaneously denying legitimate administrators the same privileges. This oversight allows malicious users to gain unauthorized control over user accounts and system configurations, leading to potential data breaches or service disruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the PolarLearn application using valid, non-admin credentials.</li>
<li>Attacker identifies the vulnerable <code>setCustomPassword</code> function within the account-management module.</li>
<li>Attacker crafts a malicious request to the <code>setCustomPassword</code> function, targeting the <code>userId</code> of an administrator account.</li>
<li>Due to the inverted admin check, the application incorrectly validates the attacker&rsquo;s non-admin privileges as sufficient for the action.</li>
<li>The application executes the <code>setCustomPassword</code> function, modifying the administrator&rsquo;s password using the attacker&rsquo;s provided value.</li>
<li>The attacker authenticates to the PolarLearn application using the compromised administrator credentials.</li>
<li>The attacker leverages the escalated administrator privileges to access sensitive data or modify critical system settings.</li>
<li>Alternatively, the attacker could exploit the <code>deleteUser</code> function, deleting administrator or other user accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35610 allows unauthorized privilege escalation within PolarLearn. Non-admin users can modify administrator passwords or delete user accounts, leading to potential data breaches, service disruption, and unauthorized access to sensitive information. The vulnerability affects versions 0-PRERELEASE-14 and earlier, potentially impacting all deployments of the software within educational institutions and other organizations using PolarLearn.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PolarLearn to a patched version beyond 0-PRERELEASE-14 to remediate the vulnerability described in CVE-2026-35610.</li>
<li>Implement the Sigma rule <code>DetectPolarLearnPrivilegeEscalation</code> to detect exploitation attempts by monitoring calls to the <code>setCustomPassword</code> function made by non-admin users.</li>
<li>Review and audit user permissions within PolarLearn to identify and remove any unauthorized administrator accounts created through exploitation of CVE-2026-35610.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35610</category><category>privilege-escalation</category><category>polarnl</category></item></channel></rss>