Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24666: CWE-352: Cross-Site Request Forgery (CSRF) in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24666cvecve-2026-24666cwe-352
Published: Tue Feb 03 2026 (02/03/2026, 16:58:57 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Cross-Site Request Forgery (CSRF) vulnerability in multiple teacher-restricted endpoints allows attackers to induce authenticated teachers to perform unintended actions, such as modifying assignment grades, via crafted requests. This issue has been patched in version 4.2.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:17:01 UTC

Technical Analysis

Open eClass, formerly known as GUnet eClass, is a widely used course management system designed to facilitate online education. Prior to version 4.2, it contained a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2026-24666 (CWE-352). This vulnerability affects multiple endpoints restricted to teacher roles, allowing an attacker to craft malicious web requests that, when executed by an authenticated teacher, can modify critical data such as assignment grades without the teacher's consent. The attack requires the victim to be logged in and to interact with a malicious webpage or link, which then sends unauthorized commands to the vulnerable endpoints. The vulnerability does not expose confidential information directly but compromises data integrity by enabling unauthorized grade changes. The CVSS 3.1 score of 6.5 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, but user interaction necessary. The scope remains unchanged as the attack affects only the teacher's session. The vulnerability was publicly disclosed and patched in version 4.2, but no known exploits have been reported in the wild. This flaw highlights the importance of implementing anti-CSRF protections such as tokens and referer checks in web applications managing sensitive academic data.

Potential Impact

For European organizations, particularly educational institutions using Open eClass, this vulnerability poses a significant risk to the integrity of academic records. Unauthorized modification of assignment grades can undermine trust in the educational process, potentially affecting student evaluations and institutional reputation. While confidentiality and availability are not directly impacted, the integrity breach could lead to administrative burdens, legal challenges, and loss of stakeholder confidence. Institutions with large numbers of teachers using vulnerable versions are at higher risk, as the attack requires authenticated teacher sessions. The attack vector being remote and requiring only user interaction increases the likelihood of exploitation if phishing or social engineering tactics are employed. Given the widespread adoption of Open eClass in Greece and other European countries, the impact could be substantial in those regions. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop exploit kits targeting this vulnerability.

Mitigation Recommendations

The primary mitigation is to upgrade Open eClass installations to version 4.2 or later, where the vulnerability has been patched. For organizations unable to immediately upgrade, implementing additional protective measures is critical: 1) Deploy anti-CSRF tokens on all state-changing requests within the teacher interface to ensure requests originate from legitimate sources. 2) Enforce strict referer header validation to block requests originating from unauthorized domains. 3) Educate teachers and staff about phishing and social engineering risks to reduce the chance of interacting with malicious links. 4) Monitor logs for unusual activity related to grade modifications, enabling early detection of exploitation attempts. 5) Consider implementing web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns. 6) Regularly audit and review user permissions to minimize the number of users with high privileges. These targeted steps go beyond generic advice and address the specific nature of this vulnerability in the Open eClass platform.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f76648b

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/4/2026, 8:17:01 AM

Last updated: 2/7/2026, 7:37:46 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats