top of page
perceptive_background_267k.jpg

OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. From version 10.5.4 to before version 20.2.5, Ope…

Published:

29 March 2026 at 22:00:00

Alert date:

30 March 2026 at 22:02:38

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Identity & Access

OpenOlat, an open source web-based e-learning platform, contains a critical vulnerability in versions 10.5.4 to before 20.2.5 where the OpenID Connect implicit flow implementation fails to verify JWT signatures. The JSONWebToken.parse() method silently discards the signature segment of compact JWTs, and the getAccessToken() methods in OpenIdConnectApi and OpenIdConnectFullConfigurableApi only validate claim-level fields without cryptographic signature verification against the Identity Provider's JWKS endpoint. This authentication bypass vulnerability has been patched in version 20.2.5.

Technical details

Mitigation steps:

Affected products:

OpenOlat

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page