Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24670: CWE-284: Improper Access Control in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24670cvecve-2026-24670cwe-284
Published: Tue Feb 03 2026 (02/03/2026, 16:56:16 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

CVE-2026-24670 is a medium severity improper access control vulnerability in the Open eClass platform versions prior to 4. 2. Authenticated students can exploit this flaw to create new course units, a capability normally restricted to privileged roles such as instructors or administrators. This vulnerability does not impact confidentiality or availability but allows unauthorized modification of course content, potentially undermining course integrity. The issue requires authentication but no user interaction beyond login, and it can be exploited remotely over the network. The vulnerability has been patched in version 4. 2, and no known exploits are currently reported in the wild. European educational institutions using Open eClass versions before 4. 2 should prioritize upgrading to mitigate this risk. Countries with significant adoption of Open eClass or similar academic platforms, such as Greece, Germany, and France, are more likely to be affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:57:10 UTC

Technical Analysis

CVE-2026-24670 is an improper access control vulnerability (CWE-284) identified in the Open eClass platform, a widely used course management system, formerly known as GUnet eClass. The vulnerability exists in versions prior to 4.2 and allows authenticated students to perform unauthorized actions—specifically, the creation of new course units. Normally, this capability is restricted to users with higher privileges such as instructors or administrators. The flaw arises from insufficient enforcement of access control checks on the course unit creation functionality, allowing lower-privileged users to bypass role restrictions. Exploitation requires the attacker to be authenticated but does not require additional user interaction, and the attack can be carried out remotely over the network. The vulnerability impacts the integrity of course content by enabling unauthorized modifications, but it does not affect confidentiality or availability. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the ease of exploitation (low attack complexity), requirement for privileges (authenticated user), and the impact limited to integrity. The vulnerability was publicly disclosed on February 3, 2026, and has been addressed in Open eClass version 4.2. No known exploits have been reported in the wild, but the risk remains for organizations running outdated versions. The vulnerability highlights the importance of strict role-based access controls in educational platforms to prevent privilege escalation and unauthorized content manipulation.

Potential Impact

For European organizations, particularly educational institutions using Open eClass, this vulnerability poses a risk to the integrity of academic course content. Unauthorized creation of course units by students could lead to misinformation, disruption of course structure, or abuse of the platform for malicious purposes such as phishing or spreading disinformation within the academic environment. While confidentiality and availability are not directly impacted, the integrity breach can undermine trust in the educational system and complicate academic administration. Institutions relying on Open eClass for course management must consider the potential for reputational damage and administrative overhead caused by unauthorized content changes. The impact is more pronounced in countries with widespread adoption of Open eClass or similar platforms, where large numbers of students and courses could be affected. Additionally, the vulnerability could be leveraged as a foothold for further attacks if combined with other vulnerabilities or social engineering tactics.

Mitigation Recommendations

The primary mitigation is to upgrade all Open eClass installations to version 4.2 or later, where the vulnerability has been patched. Organizations should conduct an inventory of their Open eClass deployments and verify the version in use. In addition to patching, administrators should audit user roles and permissions to ensure that students do not have elevated privileges beyond what is necessary. Implement monitoring and alerting for unusual course creation activities or other administrative actions performed by student accounts. Employ network segmentation and access controls to limit exposure of the Open eClass platform to trusted users and networks. Regularly review and update security policies related to user management and platform usage. Finally, provide training and awareness to staff and students about the importance of reporting suspicious activities within the platform.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f76649d

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/11/2026, 11:57:10 AM

Last updated: 3/26/2026, 3:26:38 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses