CVE-2026-24668: CWE-284: Improper Access Control in gunet openeclass
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a broken access control vulnerability allows authenticated students to add content to existing course units, an action normally restricted to higher-privileged roles. This issue has been patched in version 4.2.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-24668 affects the Open eClass platform, a widely used course management system, formerly known as GUnet eClass. Prior to version 4.2, the platform contained an improper access control weakness (CWE-284) that allowed authenticated students to add content to existing course units. Normally, only users with elevated privileges such as instructors or administrators should be able to modify course content. This flaw arises from insufficient enforcement of role-based permissions, enabling lower-privileged users to perform unauthorized actions. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only needs privileges of an authenticated user (PR:L) without additional user interaction (UI:N). The impact is limited to integrity (I:H) with no confidentiality (C:N) or availability (A:N) loss. The vulnerability was publicly disclosed and assigned a CVSS v3.1 base score of 6.5, categorized as medium severity. Although no known exploits have been reported in the wild, the risk remains significant for institutions running vulnerable versions. The issue was addressed in Open eClass version 4.2, which enforces proper access controls to restrict content modification to authorized roles only.
Potential Impact
For European organizations, particularly educational institutions using Open eClass, this vulnerability threatens the integrity of course content. Unauthorized content additions by students could lead to misinformation, academic dishonesty, or disruption of learning materials. While confidentiality and availability are not directly impacted, the trustworthiness of the educational platform is undermined. This could affect student assessments, accreditation processes, and institutional reputation. The risk is higher in countries where Open eClass has significant adoption, such as Greece, where the platform originated and is widely used. Additionally, universities and colleges with remote learning components may face increased exposure due to network accessibility. Although no active exploitation is reported, the vulnerability could be leveraged in targeted attacks to manipulate academic records or spread malicious content within courses.
Mitigation Recommendations
The primary mitigation is to upgrade all Open eClass installations to version 4.2 or later, where the access control issue has been fixed. Organizations should conduct an immediate inventory of their Open eClass versions and prioritize patching vulnerable instances. In addition to patching, administrators should audit course content for unauthorized additions or modifications, especially those made by student accounts. Implementing enhanced monitoring and alerting on content changes can help detect suspicious activity early. Reviewing and tightening role-based access controls and permissions within the platform can reduce the risk of privilege escalation. For institutions unable to upgrade immediately, temporary measures include restricting student permissions, disabling content addition features for students, or isolating vulnerable systems from external networks. User education on security best practices and awareness of potential misuse is also recommended.
Affected Countries
Greece, Cyprus, Germany, France, Italy, Spain, United Kingdom
CVE-2026-24668: CWE-284: Improper Access Control in gunet openeclass
Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a broken access control vulnerability allows authenticated students to add content to existing course units, an action normally restricted to higher-privileged roles. This issue has been patched in version 4.2.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-24668 affects the Open eClass platform, a widely used course management system, formerly known as GUnet eClass. Prior to version 4.2, the platform contained an improper access control weakness (CWE-284) that allowed authenticated students to add content to existing course units. Normally, only users with elevated privileges such as instructors or administrators should be able to modify course content. This flaw arises from insufficient enforcement of role-based permissions, enabling lower-privileged users to perform unauthorized actions. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only needs privileges of an authenticated user (PR:L) without additional user interaction (UI:N). The impact is limited to integrity (I:H) with no confidentiality (C:N) or availability (A:N) loss. The vulnerability was publicly disclosed and assigned a CVSS v3.1 base score of 6.5, categorized as medium severity. Although no known exploits have been reported in the wild, the risk remains significant for institutions running vulnerable versions. The issue was addressed in Open eClass version 4.2, which enforces proper access controls to restrict content modification to authorized roles only.
Potential Impact
For European organizations, particularly educational institutions using Open eClass, this vulnerability threatens the integrity of course content. Unauthorized content additions by students could lead to misinformation, academic dishonesty, or disruption of learning materials. While confidentiality and availability are not directly impacted, the trustworthiness of the educational platform is undermined. This could affect student assessments, accreditation processes, and institutional reputation. The risk is higher in countries where Open eClass has significant adoption, such as Greece, where the platform originated and is widely used. Additionally, universities and colleges with remote learning components may face increased exposure due to network accessibility. Although no active exploitation is reported, the vulnerability could be leveraged in targeted attacks to manipulate academic records or spread malicious content within courses.
Mitigation Recommendations
The primary mitigation is to upgrade all Open eClass installations to version 4.2 or later, where the access control issue has been fixed. Organizations should conduct an immediate inventory of their Open eClass versions and prioritize patching vulnerable instances. In addition to patching, administrators should audit course content for unauthorized additions or modifications, especially those made by student accounts. Implementing enhanced monitoring and alerting on content changes can help detect suspicious activity early. Reviewing and tightening role-based access controls and permissions within the platform can reduce the risk of privilege escalation. For institutions unable to upgrade immediately, temporary measures include restricting student permissions, disabling content addition features for students, or isolating vulnerable systems from external networks. User education on security best practices and awareness of potential misuse is also recommended.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-23T20:40:23.387Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6982fcd8f9fa50a62f766493
Added to database: 2/4/2026, 8:01:28 AM
Last enriched: 2/4/2026, 8:17:32 AM
Last updated: 2/8/2026, 10:50:34 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2147: Information Disclosure in Tenda AC21
MediumCVE-2026-2146: Unrestricted Upload in guchengwuyue yshopmall
MediumCVE-2026-2145: Cross Site Scripting in cym1102 nginxWebUI
MediumCVE-2026-2143: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2142: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.