Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24667: CWE-613: Insufficient Session Expiration in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24667cvecve-2026-24667cwe-613
Published: Tue Feb 03 2026 (02/03/2026, 16:59:32 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, failure to invalidate active user sessions after a password change allows existing session tokens to remain valid, potentially enabling unauthorized continued access to user accounts. This issue has been patched in version 4.2.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:17:18 UTC

Technical Analysis

Open eClass, a comprehensive course management system formerly known as GUnet eClass, suffers from a session management vulnerability identified as CVE-2026-24667. The flaw lies in the platform's failure to invalidate active user sessions upon a password change in versions prior to 4.2. When a user changes their password, the system should revoke all existing session tokens to prevent continued access by potentially compromised sessions. However, due to insufficient session expiration controls (CWE-613), existing session tokens remain valid, allowing an attacker who has obtained or hijacked a session token prior to the password change to maintain unauthorized access to the user account. This vulnerability has a CVSS 3.1 base score of 5.0, reflecting medium severity, with the vector indicating network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, and low impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. The issue was reserved in January 2026 and published in February 2026, with a patch available in version 4.2 of Open eClass. The vulnerability primarily affects environments where older versions of Open eClass are deployed, particularly in educational institutions and organizations relying on this platform for course management and e-learning.

Potential Impact

For European organizations, especially educational institutions and e-learning providers using Open eClass versions prior to 4.2, this vulnerability poses a risk of unauthorized persistent access to user accounts even after password changes. This can lead to unauthorized data exposure, manipulation of course content, or disruption of services. The impact on confidentiality is limited but non-negligible, as attackers can maintain access to user sessions. Integrity and availability impacts are also possible if attackers modify course data or disrupt user access. Since the vulnerability requires only low privileges and no user interaction, it could be exploited by insiders or attackers who have previously compromised session tokens. The risk is heightened in environments with weak session management policies or where password changes are a primary defense against account compromise. However, the absence of known exploits in the wild and the medium CVSS score suggest the threat is moderate but should not be underestimated.

Mitigation Recommendations

European organizations should immediately upgrade Open eClass installations to version 4.2 or later, where the vulnerability is patched. In addition, organizations should implement strict session management policies, including forced session invalidation upon password changes or other critical account modifications. Monitoring and logging of session activities can help detect anomalous session reuse. Employing multi-factor authentication (MFA) can reduce the risk of session hijacking. Regularly auditing user sessions and enforcing session timeouts will further reduce exposure. For environments where immediate upgrade is not feasible, applying compensating controls such as manual session invalidation and enhanced user awareness about session security is recommended. Network segmentation and limiting access to the Open eClass platform can also reduce attack surface. Finally, organizations should stay informed about any emerging exploits targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f76648f

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/4/2026, 8:17:18 AM

Last updated: 2/7/2026, 7:14:40 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats