


Perceptive Security
SOC/SIEM Consultancy

OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. From version 10.5.4 to before version 20.2.5, Ope…
Published:
29 March 2026 at 22:00:00
Alert date:
30 March 2026 at 22:02:38
Source:
nvd.nist.gov
Web Technologies, Identity & Access
OpenOlat, an open source web-based e-learning platform, contains a critical vulnerability in versions 10.5.4 to before 20.2.5 where the OpenID Connect implicit flow implementation fails to verify JWT signatures. The JSONWebToken.parse() method silently discards the signature segment of compact JWTs, and the getAccessToken() methods in OpenIdConnectApi and OpenIdConnectFullConfigurableApi only validate claim-level fields without cryptographic signature verification against the Identity Provider's JWKS endpoint. This authentication bypass vulnerability has been patched in version 20.2.5.
Technical details
Mitigation steps:
Affected products:
OpenOlat
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-31946
https://github.com/OpenOLAT/OpenOLAT/security/advisories/GHSA-v8vp-x4q4-2vch
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
