Timing Attack Affecting richie package, versions [,3.3.0)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-RICHIE-15367370
  • published2 Mar 2026
  • disclosed25 Feb 2026
  • creditElvin Latifli

Introduced: 25 Feb 2026

CVE-2026-26717  (opens in a new tab)
CWE-208  (opens in a new tab)

How to fix?

Upgrade richie to version 3.3.0 or higher.

Overview

richie is an A CMS to build learning portals for open education

Affected versions of this package are vulnerable to Timing Attack via the sync_course_run_from_request function. An attacker can bypass authentication by exploiting timing discrepancies during HMAC signature verification.

CVSS Base Scores

version 4.0
version 3.1