CVE-2026-34736 in openedx-platform
Сводка (Английский)
Open edX Platform enables the authoring and delivery of online learning at any scale. From the maple release to before the ulmo release, an unauthenticated attacker can fully bypass the email verification process by combining two issues: the OAuth2 password grant issuing tokens to inactive users (documented behavior) and the activation_key being exposed in the REST API response at /api/user/v1/accounts/. This issue has been patched in the ulmo release.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
Ответственный
GitHub_M
Резервировать
30.03.2026
Раскрытие
02.04.2026
Статус
Подтверждённый
Записи
VulDB provides additional information and datapoints for this CVE:
| ИД | Уязвимость | CWE | Экс | Кон | CVE |
|---|---|---|---|---|---|
| 355026 | openedx openedx-platform REST API accounts слабая аутентификация | 287 | Не определено | Официальное исправление | CVE-2026-34736 |