An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies
Metrics
Affected Vendors & Products
References
History
Fri, 27 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-208 | |
| Metrics |
cvssV3_1
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openfun
Openfun richie |
|
| Vendors & Products |
Openfun
Openfun richie |
Wed, 25 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-02-25T00:00:00.000Z
Updated: 2026-02-26T19:11:04.934Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26717
Updated: 2026-02-26T19:05:51.701Z
Status : Received
Published: 2026-02-25T17:25:39.293
Modified: 2026-02-26T20:31:37.120
Link: CVE-2026-26717
No data.