Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24668: CWE-284: Improper Access Control in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24668cvecve-2026-24668cwe-284
Published: Tue Feb 03 2026 (02/03/2026, 16:59:48 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a broken access control vulnerability allows authenticated students to add content to existing course units, an action normally restricted to higher-privileged roles. This issue has been patched in version 4.2.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:17:32 UTC

Technical Analysis

The vulnerability identified as CVE-2026-24668 affects the Open eClass platform, a widely used course management system, formerly known as GUnet eClass. Prior to version 4.2, the platform contained an improper access control weakness (CWE-284) that allowed authenticated students to add content to existing course units. Normally, only users with elevated privileges such as instructors or administrators should be able to modify course content. This flaw arises from insufficient enforcement of role-based permissions, enabling lower-privileged users to perform unauthorized actions. The vulnerability is remotely exploitable over the network (AV:N), requires low attack complexity (AC:L), and only needs privileges of an authenticated user (PR:L) without additional user interaction (UI:N). The impact is limited to integrity (I:H) with no confidentiality (C:N) or availability (A:N) loss. The vulnerability was publicly disclosed and assigned a CVSS v3.1 base score of 6.5, categorized as medium severity. Although no known exploits have been reported in the wild, the risk remains significant for institutions running vulnerable versions. The issue was addressed in Open eClass version 4.2, which enforces proper access controls to restrict content modification to authorized roles only.

Potential Impact

For European organizations, particularly educational institutions using Open eClass, this vulnerability threatens the integrity of course content. Unauthorized content additions by students could lead to misinformation, academic dishonesty, or disruption of learning materials. While confidentiality and availability are not directly impacted, the trustworthiness of the educational platform is undermined. This could affect student assessments, accreditation processes, and institutional reputation. The risk is higher in countries where Open eClass has significant adoption, such as Greece, where the platform originated and is widely used. Additionally, universities and colleges with remote learning components may face increased exposure due to network accessibility. Although no active exploitation is reported, the vulnerability could be leveraged in targeted attacks to manipulate academic records or spread malicious content within courses.

Mitigation Recommendations

The primary mitigation is to upgrade all Open eClass installations to version 4.2 or later, where the access control issue has been fixed. Organizations should conduct an immediate inventory of their Open eClass versions and prioritize patching vulnerable instances. In addition to patching, administrators should audit course content for unauthorized additions or modifications, especially those made by student accounts. Implementing enhanced monitoring and alerting on content changes can help detect suspicious activity early. Reviewing and tightening role-based access controls and permissions within the platform can reduce the risk of privilege escalation. For institutions unable to upgrade immediately, temporary measures include restricting student permissions, disabling content addition features for students, or isolating vulnerable systems from external networks. User education on security best practices and awareness of potential misuse is also recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f766493

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/4/2026, 8:17:32 AM

Last updated: 2/8/2026, 10:50:34 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats