Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24668: CWE-284: Improper Access Control in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24668cvecve-2026-24668cwe-284
Published: Tue Feb 03 2026 (02/03/2026, 16:59:48 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

CVE-2026-24668 is an improper access control vulnerability in the Open eClass platform versions prior to 4. 2. Authenticated students can exploit this flaw to add content to existing course units, an action normally restricted to instructors or administrators. The vulnerability does not affect confidentiality or availability but allows unauthorized modification of course content, impacting data integrity. It requires authentication but no user interaction beyond login, and can be exploited remotely over the network. The issue has been patched in version 4. 2. European educational institutions using vulnerable versions are at risk of unauthorized content manipulation, which could undermine course integrity and trust. Mitigation involves upgrading to version 4. 2 or later and auditing user permissions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:56:49 UTC

Technical Analysis

The vulnerability identified as CVE-2026-24668 affects the Open eClass platform, a widely used course management system primarily in academic environments. The flaw is categorized under CWE-284 (Improper Access Control) and exists in versions prior to 4.2. It allows authenticated students—who normally have limited permissions—to add content to existing course units, an operation reserved for instructors or administrators. This unauthorized privilege escalation occurs because the platform fails to properly enforce role-based access controls on content modification functions. Exploitation requires the attacker to be logged in as a student but does not require additional user interaction or elevated privileges beyond authentication. The vulnerability is remotely exploitable over the network, making it a significant risk for institutions that have not updated their systems. Although the vulnerability does not compromise confidentiality or availability, it severely impacts the integrity of course content, potentially allowing misinformation, unauthorized materials, or malicious content insertion. The issue was publicly disclosed in early 2026 and has been addressed in Open eClass version 4.2, which implements stricter access control checks to prevent unauthorized content additions. No known exploits are currently reported in the wild, but the risk remains for unpatched systems.

Potential Impact

For European organizations, particularly educational institutions using Open eClass, this vulnerability poses a risk to the integrity of academic content. Unauthorized content additions by students could lead to misinformation, disruption of course delivery, and loss of trust in the platform. While confidentiality and availability are not directly impacted, the integrity breach could have downstream effects such as reputational damage and potential compliance issues with educational standards and data governance policies. Institutions relying on Open eClass for critical course management may face operational challenges if malicious content insertion leads to confusion or requires extensive remediation. The medium CVSS score reflects the moderate severity but significant impact on data integrity within the academic context. The vulnerability is especially concerning in remote or hybrid learning environments where monitoring and manual oversight are limited.

Mitigation Recommendations

The primary mitigation is to upgrade all Open eClass installations to version 4.2 or later, where the access control flaw has been fixed. Organizations should conduct an audit of user roles and permissions to ensure that only authorized personnel have content modification rights. Implementing additional monitoring and logging of content changes can help detect unauthorized modifications early. Where upgrading is not immediately feasible, applying compensating controls such as restricting student access to course units or employing web application firewalls to detect anomalous requests may reduce risk. Educating users about the importance of reporting suspicious content changes and maintaining regular backups of course content will aid in recovery if exploitation occurs. Finally, institutions should review their incident response plans to address potential integrity breaches in educational platforms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f766493

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/11/2026, 11:56:49 AM

Last updated: 3/25/2026, 9:40:24 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses