Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24669: CWE-613: Insufficient Session Expiration in gunet openeclass

0
High
VulnerabilityCVE-2026-24669cvecve-2026-24669cwe-613
Published: Tue Feb 03 2026 (02/03/2026, 17:00:38 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

CVE-2026-24669 is a high-severity vulnerability in the Open eClass platform versions prior to 4. 2, caused by insufficient session expiration in the password reset mechanism. It allows local attackers to reuse a valid password reset token after it has already been used, enabling unauthorized password changes and potential account takeover. Exploitation requires local access and user interaction but no privileges. The vulnerability impacts confidentiality, integrity, and availability of user accounts. A patch is available in version 4. 2. European organizations using Open eClass should prioritize upgrading to mitigate risks. Countries with significant academic and research institutions using Open eClass are most at risk. No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:56:58 UTC

Technical Analysis

The vulnerability identified as CVE-2026-24669 affects the Open eClass platform, a widely used course management system, particularly in academic environments. The root cause is an insufficient session expiration mechanism related to password reset tokens. Specifically, prior to version 4.2, once a password reset token is used, it remains valid and can be reused by a local attacker. This flaw violates secure session management principles (CWE-613), allowing attackers to perform unauthorized password changes on user accounts. The attack vector requires local access and user interaction, but no prior privileges, making it accessible to a broad range of threat actors with some level of access. The vulnerability impacts confidentiality by exposing user credentials, integrity by allowing unauthorized password changes, and availability by potentially locking out legitimate users. The CVSS v3.1 score is 7.8 (high), reflecting the significant risk posed. The issue has been addressed in Open eClass version 4.2, which implements proper invalidation of password reset tokens after use, preventing reuse and securing the password reset process.

Potential Impact

For European organizations, particularly educational institutions and research centers that rely on Open eClass for course management, this vulnerability poses a serious risk of account compromise and unauthorized access. Attackers exploiting this flaw could take over user accounts, including those of students, faculty, and administrators, potentially leading to data breaches, unauthorized data manipulation, and disruption of educational services. The compromise of administrative accounts could further escalate to broader system control, impacting the integrity and availability of the platform. Given the widespread use of Open eClass in European academia, the impact could be significant, affecting privacy compliance under GDPR and damaging institutional reputation. The requirement for local access limits remote exploitation but does not eliminate risk, as insider threats or compromised internal systems could facilitate attacks.

Mitigation Recommendations

European organizations should immediately upgrade Open eClass installations to version 4.2 or later, where the vulnerability is patched. Until upgrades are completed, implement strict access controls to limit local access to trusted users only. Monitor and audit password reset activities for suspicious reuse of tokens. Employ multi-factor authentication (MFA) to reduce the impact of compromised credentials. Educate users and administrators about the risks of password reset token reuse and encourage prompt reporting of unusual account activities. Additionally, consider network segmentation to isolate the Open eClass environment and reduce insider threat risks. Regularly review and update session management policies to ensure tokens expire appropriately and cannot be reused. Finally, maintain up-to-date backups to recover quickly from potential account takeovers or data integrity issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f766497

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/11/2026, 11:56:58 AM

Last updated: 3/24/2026, 12:06:27 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses