CVE-2026-24665: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gunet openeclass
CVE-2026-24665 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the Open eClass platform versions prior to 4. 2. Authenticated students can inject malicious JavaScript code into uploaded assignment files, which executes when instructors view these submissions. This vulnerability allows attackers to compromise the confidentiality and integrity of instructor sessions, potentially leading to credential theft or unauthorized actions within the platform. The flaw requires authentication and user interaction (instructor viewing the submission) but can have a widespread impact due to the sensitive academic environment. The issue has been patched in version 4. 2, and no known exploits are currently reported in the wild. European educational institutions using Open eClass should prioritize upgrading to mitigate this risk. Countries with significant adoption of Open eClass and large academic sectors are most at risk. Immediate mitigation involves patching, restricting file upload types, and monitoring for suspicious activity.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-24665 affects the Open eClass platform, a widely used course management system in academic environments. The flaw is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, which arises from improper neutralization of input during web page generation. Specifically, authenticated students can embed malicious JavaScript code within uploaded assignment files. When instructors access these submissions through the platform interface, the embedded script executes in their browsers. This execution context allows attackers to hijack instructor sessions, steal sensitive information such as credentials, or perform unauthorized actions on behalf of the instructor. The vulnerability requires the attacker to be authenticated as a student and relies on the instructor interacting with the malicious content, which introduces some exploitation complexity. However, the impact is significant due to the high trust level and privileges instructors hold within the system. The vulnerability affects all Open eClass versions prior to 4.2, where the issue has been addressed and patched. The CVSS v3.1 score of 8.7 reflects the high impact on confidentiality and integrity, low attack complexity, and the requirement for privileges and user interaction. No public exploits have been reported yet, but the academic sector's reliance on this platform makes it a valuable target for attackers aiming to disrupt educational operations or conduct espionage.
Potential Impact
For European organizations, particularly educational institutions using Open eClass, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized access to instructor accounts, exposure of sensitive academic data, and potential manipulation of grading or course content. The confidentiality of instructor communications and student submissions may be compromised, undermining trust in the platform. Additionally, attackers could leverage compromised instructor accounts to pivot to other internal systems, escalating the impact beyond the learning management system. The disruption caused by such attacks could affect academic integrity and operational continuity. Given the widespread use of Open eClass in several European countries, the threat could have broad regional implications, especially in countries with large public education sectors or those that have integrated Open eClass into national e-learning infrastructures.
Mitigation Recommendations
1. Immediate upgrade to Open eClass version 4.2 or later, where the vulnerability is patched. 2. Implement strict input validation and sanitization on file uploads, especially for assignment submissions, to prevent script injection. 3. Restrict allowed file types and scan uploaded files for embedded scripts or suspicious content using specialized security tools. 4. Educate instructors to be cautious when opening assignment files and consider using sandboxed environments or isolated viewers for submissions. 5. Monitor platform logs for unusual activity, such as repeated access to assignment files or anomalous instructor session behaviors. 6. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the platform. 7. Regularly review and update user privileges to minimize the risk of privilege escalation. 8. Conduct security awareness training for both students and staff about the risks of malicious file uploads and social engineering.
Affected Countries
Greece, Germany, France, Italy, Spain, Portugal, Poland
CVE-2026-24665: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gunet openeclass
Description
CVE-2026-24665 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the Open eClass platform versions prior to 4. 2. Authenticated students can inject malicious JavaScript code into uploaded assignment files, which executes when instructors view these submissions. This vulnerability allows attackers to compromise the confidentiality and integrity of instructor sessions, potentially leading to credential theft or unauthorized actions within the platform. The flaw requires authentication and user interaction (instructor viewing the submission) but can have a widespread impact due to the sensitive academic environment. The issue has been patched in version 4. 2, and no known exploits are currently reported in the wild. European educational institutions using Open eClass should prioritize upgrading to mitigate this risk. Countries with significant adoption of Open eClass and large academic sectors are most at risk. Immediate mitigation involves patching, restricting file upload types, and monitoring for suspicious activity.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-24665 affects the Open eClass platform, a widely used course management system in academic environments. The flaw is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, which arises from improper neutralization of input during web page generation. Specifically, authenticated students can embed malicious JavaScript code within uploaded assignment files. When instructors access these submissions through the platform interface, the embedded script executes in their browsers. This execution context allows attackers to hijack instructor sessions, steal sensitive information such as credentials, or perform unauthorized actions on behalf of the instructor. The vulnerability requires the attacker to be authenticated as a student and relies on the instructor interacting with the malicious content, which introduces some exploitation complexity. However, the impact is significant due to the high trust level and privileges instructors hold within the system. The vulnerability affects all Open eClass versions prior to 4.2, where the issue has been addressed and patched. The CVSS v3.1 score of 8.7 reflects the high impact on confidentiality and integrity, low attack complexity, and the requirement for privileges and user interaction. No public exploits have been reported yet, but the academic sector's reliance on this platform makes it a valuable target for attackers aiming to disrupt educational operations or conduct espionage.
Potential Impact
For European organizations, particularly educational institutions using Open eClass, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized access to instructor accounts, exposure of sensitive academic data, and potential manipulation of grading or course content. The confidentiality of instructor communications and student submissions may be compromised, undermining trust in the platform. Additionally, attackers could leverage compromised instructor accounts to pivot to other internal systems, escalating the impact beyond the learning management system. The disruption caused by such attacks could affect academic integrity and operational continuity. Given the widespread use of Open eClass in several European countries, the threat could have broad regional implications, especially in countries with large public education sectors or those that have integrated Open eClass into national e-learning infrastructures.
Mitigation Recommendations
1. Immediate upgrade to Open eClass version 4.2 or later, where the vulnerability is patched. 2. Implement strict input validation and sanitization on file uploads, especially for assignment submissions, to prevent script injection. 3. Restrict allowed file types and scan uploaded files for embedded scripts or suspicious content using specialized security tools. 4. Educate instructors to be cautious when opening assignment files and consider using sandboxed environments or isolated viewers for submissions. 5. Monitor platform logs for unusual activity, such as repeated access to assignment files or anomalous instructor session behaviors. 6. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the platform. 7. Regularly review and update user privileges to minimize the risk of privilege escalation. 8. Conduct security awareness training for both students and staff about the risks of malicious file uploads and social engineering.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-23T20:40:23.387Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6982fcd8f9fa50a62f766488
Added to database: 2/4/2026, 8:01:28 AM
Last enriched: 2/11/2026, 11:56:08 AM
Last updated: 3/24/2026, 7:47:19 PM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.