CVE-2026-34736
Received Received - Intake
OAuth2 Token Bypass and Email Verification Flaw in Open edX

Publication date: 2026-04-02

Last updated on: 2026-04-02

Assigner: GitHub, Inc.

Description
Open edX Platform enables the authoring and delivery of online learning at any scale. From the maple release to before the ulmo release, an unauthenticated attacker can fully bypass the email verification process by combining two issues: the OAuth2 password grant issuing tokens to inactive users (documented behavior) and the activation_key being exposed in the REST API response at /api/user/v1/accounts/. This issue has been patched in the ulmo release.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
edx open_edx to ulmo (exc)
openedx openedx_platform From maple|end_including=ulmo (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-34736 is a moderate severity vulnerability in the Open edX platform that allows an unauthenticated attacker to bypass the email verification process.

This is possible because of two combined issues: first, the OAuth2 password grant issues authentication tokens to inactive users (which is documented behavior); second, the activation_key is exposed in the REST API response at the endpoint /api/user/v1/accounts/.

By exploiting these, an attacker can activate accounts without needing access to the user's email verification link.


How can this vulnerability impact me? :

This vulnerability allows an attacker to activate user accounts without proper email verification, which compromises the integrity of the account activation process.

An attacker can register an account, obtain an OAuth2 token despite the account being inactive, retrieve the activation_key from the API response, and activate the account by sending a request with that key.

This unauthorized activation could lead to unauthorized modifications of account states, potentially allowing attackers to bypass intended security controls.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the Open edX platform version in use is between the maple release and before the ulmo release, as these versions expose the activation_key in the REST API response.

Specifically, you can test the presence of the activation_key field by sending an unauthenticated GET request to the endpoint /api/user/v1/accounts/ or /api/user/v1/accounts/{username} and inspecting the JSON response for the activation_key field.

A sample command using curl to check this would be:

  • curl -s https://your-openedx-instance/api/user/v1/accounts/{username} | grep activation_key

If the activation_key is present in the response, the system is vulnerable to this issue.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Open edX platform to the ulmo release or later, where this vulnerability has been patched.

The patch removes the activation_key field from the user account REST API responses, preventing unauthorized access to the activation key and thus blocking the email verification bypass.

Until the upgrade can be performed, restrict access to the /api/user/v1/accounts/ endpoint to authenticated and authorized users only, if possible, to reduce exposure.

Additionally, monitor for any suspicious account activations that could indicate exploitation of this vulnerability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an unauthenticated attacker to bypass the email verification process and activate user accounts without proper verification. This unauthorized account activation could lead to integrity issues by enabling unauthorized modifications to user account status.

While the vulnerability does not impact confidentiality or availability, the ability to activate accounts without verification may undermine trust in user identity validation processes, which could have implications for compliance with standards that require strong user authentication and identity verification, such as GDPR and HIPAA.

However, there is no explicit information in the provided resources about direct effects on compliance with GDPR, HIPAA, or other regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart