Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.8
OpenFUN Richie allows attackers to bypass authentication
CVE-2026-26717
GHSA-xjhr-fm27-4hmx
Summary
OpenFUN Richie's course syncing function has a timing flaw that can be exploited by attackers to fake authentication. This could allow unauthorized access to sensitive data or actions. Update the software to fix this issue.
What to do
- Update richie to version 3.3.0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | richie | <= 3.3.0 | 3.3.0 |
Original title
OpenFUN Richie Observable Timing Discrepancy in its sync_course_run_from_request function
Original description
An issue in OpenFUN Richie (LMS) in src/richie/apps/courses/api.py. The application used the non-constant time == operator for HMAC signature verification in the sync_course_run_from_request function. This allows remote attackers to forge valid signatures and bypass authentication by measuring response time discrepancies.
nvd CVSS3.1
4.8
Vulnerability type
CWE-208
- https://nvd.nist.gov/vuln/detail/CVE-2026-26717
- https://github.com/advisories/GHSA-xjhr-fm27-4hmx
- https://github.com/Rickidevs/CVE-2026-26717
- https://github.com/openfun/richie/commit/a1b5bbda3403d7debb466c303a32852925fcba5...
- https://medium.com/@ordogh/cve-2026-26717-hmac-timing-attack-in-openfun-richie-l...
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026