CVE-2026-24666: CWE-352: Cross-Site Request Forgery (CSRF) in gunet openeclass
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Cross-Site Request Forgery (CSRF) vulnerability in multiple teacher-restricted endpoints allows attackers to induce authenticated teachers to perform unintended actions, such as modifying assignment grades, via crafted requests. This issue has been patched in version 4.2.
AI Analysis
Technical Summary
Open eClass, formerly known as GUnet eClass, is a widely used course management system designed to facilitate online education. Prior to version 4.2, it contained a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2026-24666 (CWE-352). This vulnerability affects multiple endpoints restricted to teacher roles, allowing an attacker to craft malicious web requests that, when executed by an authenticated teacher, can modify critical data such as assignment grades without the teacher's consent. The attack requires the victim to be logged in and to interact with a malicious webpage or link, which then sends unauthorized commands to the vulnerable endpoints. The vulnerability does not expose confidential information directly but compromises data integrity by enabling unauthorized grade changes. The CVSS 3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, but user interaction necessary. The scope remains unchanged as the attack affects only the teacher's session. The vulnerability was publicly disclosed and patched in version 4.2, but no known exploits have been reported in the wild. This flaw highlights the importance of implementing anti-CSRF protections such as tokens and referer checks in web applications managing sensitive academic data.
Potential Impact
For European organizations, particularly educational institutions using Open eClass, this vulnerability poses a significant risk to the integrity of academic records. Unauthorized modification of assignment grades can undermine trust in the educational process, potentially affecting student evaluations and institutional reputation. While confidentiality and availability are not directly impacted, the integrity breach could lead to administrative burdens, legal challenges, and loss of stakeholder confidence. Institutions with large numbers of teachers using vulnerable versions are at higher risk, as the attack requires authenticated teacher sessions. The attack vector being remote and requiring only user interaction increases the likelihood of exploitation if phishing or social engineering tactics are employed. Given the widespread adoption of Open eClass in Greece and other European countries, the impact could be substantial in those regions. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop exploit kits targeting this vulnerability.
Mitigation Recommendations
The primary mitigation is to upgrade Open eClass installations to version 4.2 or later, where the vulnerability has been patched. For organizations unable to immediately upgrade, implementing additional protective measures is critical: 1) Deploy anti-CSRF tokens on all state-changing requests within the teacher interface to ensure requests originate from legitimate sources. 2) Enforce strict referer header validation to block requests originating from unauthorized domains. 3) Educate teachers and staff about phishing and social engineering risks to reduce the chance of interacting with malicious links. 4) Monitor logs for unusual activity related to grade modifications, enabling early detection of exploitation attempts. 5) Consider implementing web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns. 6) Regularly audit and review user permissions to minimize the number of users with high privileges. These targeted steps go beyond generic advice and address the specific nature of this vulnerability in the Open eClass platform.
Affected Countries
Greece, Germany, France, Italy, Spain
CVE-2026-24666: CWE-352: Cross-Site Request Forgery (CSRF) in gunet openeclass
Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Cross-Site Request Forgery (CSRF) vulnerability in multiple teacher-restricted endpoints allows attackers to induce authenticated teachers to perform unintended actions, such as modifying assignment grades, via crafted requests. This issue has been patched in version 4.2.
AI-Powered Analysis
Technical Analysis
Open eClass, formerly known as GUnet eClass, is a widely used course management system designed to facilitate online education. Prior to version 4.2, it contained a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2026-24666 (CWE-352). This vulnerability affects multiple endpoints restricted to teacher roles, allowing an attacker to craft malicious web requests that, when executed by an authenticated teacher, can modify critical data such as assignment grades without the teacher's consent. The attack requires the victim to be logged in and to interact with a malicious webpage or link, which then sends unauthorized commands to the vulnerable endpoints. The vulnerability does not expose confidential information directly but compromises data integrity by enabling unauthorized grade changes. The CVSS 3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, but user interaction necessary. The scope remains unchanged as the attack affects only the teacher's session. The vulnerability was publicly disclosed and patched in version 4.2, but no known exploits have been reported in the wild. This flaw highlights the importance of implementing anti-CSRF protections such as tokens and referer checks in web applications managing sensitive academic data.
Potential Impact
For European organizations, particularly educational institutions using Open eClass, this vulnerability poses a significant risk to the integrity of academic records. Unauthorized modification of assignment grades can undermine trust in the educational process, potentially affecting student evaluations and institutional reputation. While confidentiality and availability are not directly impacted, the integrity breach could lead to administrative burdens, legal challenges, and loss of stakeholder confidence. Institutions with large numbers of teachers using vulnerable versions are at higher risk, as the attack requires authenticated teacher sessions. The attack vector being remote and requiring only user interaction increases the likelihood of exploitation if phishing or social engineering tactics are employed. Given the widespread adoption of Open eClass in Greece and other European countries, the impact could be substantial in those regions. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop exploit kits targeting this vulnerability.
Mitigation Recommendations
The primary mitigation is to upgrade Open eClass installations to version 4.2 or later, where the vulnerability has been patched. For organizations unable to immediately upgrade, implementing additional protective measures is critical: 1) Deploy anti-CSRF tokens on all state-changing requests within the teacher interface to ensure requests originate from legitimate sources. 2) Enforce strict referer header validation to block requests originating from unauthorized domains. 3) Educate teachers and staff about phishing and social engineering risks to reduce the chance of interacting with malicious links. 4) Monitor logs for unusual activity related to grade modifications, enabling early detection of exploitation attempts. 5) Consider implementing web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns. 6) Regularly audit and review user permissions to minimize the number of users with high privileges. These targeted steps go beyond generic advice and address the specific nature of this vulnerability in the Open eClass platform.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-23T20:40:23.387Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6982fcd8f9fa50a62f76648b
Added to database: 2/4/2026, 8:01:28 AM
Last enriched: 2/4/2026, 8:17:01 AM
Last updated: 2/7/2026, 7:37:46 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.