Description

PolarLearn is a free and open-source learning program. In 0-PRERELEASE-15 and earlier, a timing attack vulnerability in the sign-in process allows unauthenticated attackers to determine if a specific email address is registered on the platform. By measuring the response time of the login endpoint, an attacker can distinguish between valid and invalid email addresses. This occurs because the server only performs the computationally expensive Argon2 password hashing if the user exists in the database. Requests for existing users take significantly longer (~650ms) than requests for non-existent users (~160ms).

INFO

Published Date :

2026-02-02T23:01:02.519Z

Last Modified :

2026-02-04T21:09:06.648Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-25222 vulnerability.

Vendors Products
Polarlearn
  • Polarlearn
Polarnl
  • Polarlearn
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25222.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact