Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24666: CWE-352: Cross-Site Request Forgery (CSRF) in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24666cvecve-2026-24666cwe-352
Published: Tue Feb 03 2026 (02/03/2026, 16:58:57 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

CVE-2026-24666 is a Cross-Site Request Forgery (CSRF) vulnerability affecting Open eClass versions prior to 4. 2. This vulnerability allows attackers to trick authenticated teachers into executing unintended actions, such as modifying assignment grades, by sending crafted requests. The flaw exists in multiple teacher-restricted endpoints and requires the victim to be authenticated and interact with a malicious link or page. The vulnerability has been patched in version 4. 2. With a CVSS score of 6. 5, it is classified as medium severity. There are no known exploits in the wild currently. European educational institutions using Open eClass versions before 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:56:21 UTC

Technical Analysis

Open eClass, formerly known as GUnet eClass, is a comprehensive course management system widely used in academic environments. Prior to version 4.2, it contained a Cross-Site Request Forgery (CSRF) vulnerability (CVE-2026-24666) in multiple endpoints restricted to teachers. CSRF vulnerabilities allow attackers to induce authenticated users to perform actions without their consent by exploiting the trust a web application places in the user's browser. In this case, an attacker can craft malicious requests that, when executed by an authenticated teacher, can modify sensitive data such as assignment grades. The vulnerability does not require the attacker to have privileges beyond that of a teacher, but it does require the victim to be authenticated and to interact with a maliciously crafted link or webpage (user interaction). The CVSS 3.1 base score is 6.5, reflecting a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, but user interaction necessary, and high impact on integrity without affecting confidentiality or availability. The issue was addressed in Open eClass version 4.2 by implementing proper CSRF protections, likely including anti-CSRF tokens and validation of request origins. No known exploits have been reported in the wild, but the vulnerability poses a risk to the integrity of academic records and trust in the platform if left unpatched.

Potential Impact

For European organizations, particularly educational institutions using Open eClass, this vulnerability can lead to unauthorized modification of academic records, such as grades, undermining the integrity of educational assessments. This can cause reputational damage, legal liabilities, and loss of trust among students and staff. Since the vulnerability requires an authenticated teacher to be tricked into performing actions, social engineering or phishing campaigns could be used as attack vectors. The impact is primarily on data integrity, with no direct confidentiality or availability impact. However, the manipulation of grades or course content can have significant downstream effects on academic outcomes and institutional credibility. Institutions that have not upgraded to version 4.2 or implemented equivalent mitigations remain vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Upgrade all Open eClass installations to version 4.2 or later immediately to apply the official patch addressing the CSRF vulnerability. 2. Implement anti-CSRF tokens on all state-changing endpoints, ensuring that requests include a valid token that is verified server-side. 3. Enforce strict referer or origin header validation to confirm that requests originate from trusted sources. 4. Educate teachers and staff about phishing and social engineering risks to reduce the likelihood of falling victim to malicious links. 5. Monitor logs for unusual activity related to grade changes or other sensitive operations, enabling early detection of exploitation attempts. 6. Consider implementing multi-factor authentication (MFA) for teacher accounts to add an additional layer of security. 7. Regularly review and audit user permissions to ensure that only authorized personnel have access to sensitive functions. 8. Deploy web application firewalls (WAFs) with rules to detect and block CSRF attack patterns where feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f76648b

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/11/2026, 11:56:21 AM

Last updated: 3/24/2026, 3:51:04 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses