Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24671: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24671cvecve-2026-24671cwe-79
Published: Tue Feb 03 2026 (02/03/2026, 16:56:26 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated high-privileged users (teachers or administrators) to inject malicious JavaScript into multiple user-controllable input fields across the application, which is executed when other users access affected pages. This issue has been patched in version 4.2.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:18:14 UTC

Technical Analysis

CVE-2026-24671 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Open eClass platform, a widely used course management system, formerly known as GUnet eClass. The vulnerability affects all versions prior to 4.2 and stems from improper neutralization of input during web page generation (CWE-79). Specifically, authenticated users with high privileges—teachers or administrators—can inject malicious JavaScript code into multiple input fields that are stored and later rendered in the application without proper sanitization or encoding. When other users, such as students or staff, access these compromised pages, the injected scripts execute in their browsers. This can lead to session hijacking, unauthorized actions performed on behalf of users, theft of sensitive information, or manipulation of displayed content. The vulnerability requires the attacker to have authenticated access with elevated privileges, and user interaction is necessary to trigger the malicious payload. The CVSS v3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. No known exploits have been reported in the wild to date. The vendor addressed this issue in Open eClass version 4.2 by implementing proper input validation and output encoding to neutralize malicious scripts. Given the platform's use in educational institutions, the vulnerability poses a risk to the confidentiality and integrity of user data and the trustworthiness of the learning environment.

Potential Impact

For European organizations, particularly educational institutions using Open eClass, this vulnerability can lead to significant risks including unauthorized access to user sessions, data theft, and manipulation of course content or user interactions. The compromise of student or staff accounts could result in exposure of personal data, disruption of educational activities, and erosion of trust in digital learning platforms. Since the vulnerability requires high-privileged authenticated users to inject malicious code, insider threats or compromised administrator accounts pose the greatest risk. The execution of malicious scripts in users' browsers can also facilitate further attacks such as phishing or malware delivery. The impact extends to regulatory compliance, as data breaches involving personal information could violate GDPR requirements, leading to legal and financial consequences. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments where older versions remain in use. Therefore, European educational organizations must consider this vulnerability a medium-level threat that could affect confidentiality and integrity if exploited.

Mitigation Recommendations

To mitigate CVE-2026-24671, European organizations should immediately upgrade Open eClass installations to version 4.2 or later, where the vulnerability is patched. In environments where immediate upgrade is not feasible, implement strict access controls to limit high-privileged user accounts and monitor their activities for suspicious behavior. Employ web application firewalls (WAFs) with rules designed to detect and block malicious script injections targeting known vulnerable input fields. Conduct regular security audits and code reviews to ensure input validation and output encoding are properly enforced. Educate administrators and teachers about the risks of injecting untrusted content and enforce policies to prevent misuse of input fields. Additionally, enable Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in users' browsers. Finally, monitor logs for unusual patterns indicative of attempted XSS exploitation and respond promptly to any detected incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.387Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f7664a1

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/4/2026, 8:18:14 AM

Last updated: 2/7/2026, 7:37:46 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats