Velocity Directive Injection in OpenOlat E-Learning Platform by OpenOLAT
CVE-2026-28228

8.8HIGH

Key Information:

Vendor

Openolat

Status
Vendor
CVE Published:
30 March 2026

What is CVE-2026-28228?

OpenOlat, the open-source web-based e-learning platform, contains a vulnerability where authenticated users with Author roles can inject Velocity directives into reminder email templates. This vulnerability can be exploited when the reminder email is processed, enabling an attacker to evaluate injected directives on the server side. By utilizing Velocity's #set directive alongside Java reflection, an attacker could instantiate arbitrary Java classes like java.lang.ProcessBuilder, allowing for system command execution with the privileges of the Tomcat process. The flaw has been addressed in updated versions 19.1.31, 20.1.18, and 20.2.5.

Affected Version(s)

OpenOLAT < 19.1.31 < 19.1.31

OpenOLAT < 20.1.18 < 20.1.18

OpenOLAT < 20.2.5 < 20.2.5

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.