Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24664: CWE-204: Observable Response Discrepancy in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24664cvecve-2026-24664cwe-204
Published: Tue Feb 03 2026 (02/03/2026, 16:56:07 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

CVE-2026-24664 is a medium severity username enumeration vulnerability in the Open eClass platform (formerly GUnet eClass) versions prior to 4. 2. It allows unauthenticated attackers to identify valid usernames by analyzing observable differences in login response behavior. This vulnerability does not impact confidentiality beyond username disclosure, nor does it affect integrity or availability. Exploitation requires no authentication or user interaction and can be performed remotely over the network. The issue has been patched in version 4. 2. European organizations using affected versions should update promptly to prevent potential reconnaissance activities that could facilitate further attacks. Countries with significant adoption of Open eClass in educational institutions are most at risk. Mitigation involves upgrading to version 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:55:56 UTC

Technical Analysis

CVE-2026-24664 identifies a username enumeration vulnerability in the Open eClass platform, a comprehensive course management system widely used in academic environments. The vulnerability arises from observable response discrepancies during the login process in versions prior to 4.2. Specifically, when an attacker submits a login request with a username, the system's response behavior differs depending on whether the username exists or not. These differences can be timing variations, error messages, or other subtle response characteristics that allow an unauthenticated attacker to confirm valid usernames without needing credentials or user interaction. This type of vulnerability falls under CWE-204: Observable Response Discrepancy. Although it does not directly expose passwords or sensitive data, username enumeration is a critical reconnaissance step that can facilitate targeted brute force or phishing attacks. The vulnerability has a CVSS v3.1 base score of 5.3 (medium severity), reflecting its network attack vector, low attack complexity, no privileges required, and no user interaction needed. The issue was publicly disclosed in early 2026 and has been addressed in Open eClass version 4.2, which standardizes login responses to prevent enumeration. No known exploits are currently reported in the wild, but the vulnerability's presence in educational platforms makes it a notable risk for institutions relying on Open eClass for course management.

Potential Impact

For European organizations, particularly educational institutions using Open eClass versions prior to 4.2, this vulnerability enables attackers to enumerate valid usernames remotely without authentication. This can lead to increased risk of targeted attacks such as credential stuffing, brute force password attempts, or social engineering campaigns against identified users. While the vulnerability does not directly compromise sensitive data or system integrity, the exposure of valid usernames undermines user privacy and can serve as a stepping stone for more severe attacks. The impact is heightened in environments where usernames correspond to real identities of students, faculty, or staff, potentially exposing them to phishing or identity theft. Additionally, enumeration can facilitate automated attacks that degrade system availability indirectly. Given the widespread use of Open eClass in European academic institutions, the vulnerability could affect a significant user base if unpatched. However, the lack of known active exploitation reduces immediate risk, though the medium severity rating warrants prompt remediation.

Mitigation Recommendations

The primary and most effective mitigation is to upgrade Open eClass to version 4.2 or later, where the username enumeration vulnerability has been patched by normalizing login response behaviors. Organizations should audit their current Open eClass installations to identify affected versions and prioritize updates. In addition to patching, administrators can implement monitoring and alerting on login endpoints to detect unusual patterns indicative of enumeration attempts, such as rapid login failures or repeated requests with varying usernames from single IP addresses. Rate limiting and IP blacklisting can further reduce the risk of automated enumeration. Employing multi-factor authentication (MFA) can mitigate the impact of username disclosure by adding an additional layer of security. User education on phishing risks and secure password practices should complement technical controls. Finally, reviewing and minimizing information leakage in error messages and response times across all authentication interfaces is recommended to prevent similar enumeration issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.386Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd6f9fa50a62f76638d

Added to database: 2/4/2026, 8:01:26 AM

Last enriched: 2/11/2026, 11:55:56 AM

Last updated: 3/26/2026, 4:17:27 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses