Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24669: CWE-613: Insufficient Session Expiration in gunet openeclass

0
High
VulnerabilityCVE-2026-24669cvecve-2026-24669cwe-613
Published: Tue Feb 03 2026 (02/03/2026, 17:00:38 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an insecure password reset mechanism allows local attackers to reuse a valid password reset token after it has already been used, enabling unauthorized password changes and potential account takeover. This issue has been patched in version 4.2.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:17:49 UTC

Technical Analysis

CVE-2026-24669 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting the Open eClass platform, a widely used course management system. The flaw exists in versions prior to 4.2 in the password reset mechanism, where the system fails to invalidate password reset tokens after their initial use. This allows a local attacker, who has obtained a valid reset token, to reuse it multiple times to change the password of a targeted account without authorization. The vulnerability requires local access and user interaction (e.g., triggering the reset process), but no elevated privileges are necessary. The failure to expire or revoke tokens properly compromises the confidentiality and integrity of user credentials and can lead to account takeover, potentially disrupting availability if accounts are locked or manipulated. The vulnerability was publicly disclosed and assigned a CVSS 3.1 score of 7.8, indicating high severity. Although no known exploits are currently reported in the wild, the risk remains significant due to the sensitive nature of educational data and user accounts managed by Open eClass. The issue has been addressed in Open eClass version 4.2, which implements proper token invalidation to prevent reuse.

Potential Impact

For European organizations, particularly educational institutions relying on Open eClass, this vulnerability poses a significant risk. Unauthorized password changes can lead to account takeovers, exposing sensitive academic records, personal data, and potentially enabling further lateral movement within institutional networks. The compromise of user accounts could disrupt course management, grading, and communication, impacting operational continuity and trust. Given the widespread use of Open eClass in European universities and schools, the vulnerability could affect a large number of users. The local access requirement somewhat limits remote exploitation, but insider threats or compromised local machines could be leveraged. The high CVSS score reflects the potential for severe confidentiality, integrity, and availability impacts. Additionally, the exposure of academic data could have regulatory implications under GDPR, increasing legal and compliance risks for affected organizations.

Mitigation Recommendations

The primary mitigation is to upgrade all Open eClass installations to version 4.2 or later, where the password reset token reuse issue is fixed. Organizations should audit their current versions and prioritize patching vulnerable systems. Beyond upgrading, administrators should enforce strict session and token management policies, ensuring that password reset tokens are single-use and expire promptly. Implementing multi-factor authentication (MFA) for account recovery processes can add an additional security layer. Monitoring and logging password reset requests and account changes can help detect suspicious activities early. User education on secure password reset practices and awareness of phishing attempts is also recommended. For environments where immediate upgrading is not feasible, restricting local access and isolating vulnerable systems can reduce exploitation risk. Regular security assessments and penetration testing focusing on authentication mechanisms should be conducted to identify similar weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f766497

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/4/2026, 8:17:49 AM

Last updated: 2/6/2026, 9:41:58 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats