Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24673: CWE-434: Unrestricted Upload of File with Dangerous Type in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24673cvecve-2026-24673cwe-434
Published: Tue Feb 03 2026 (02/03/2026, 16:56:59 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

CVE-2026-24673 is a medium-severity vulnerability in the Open eClass platform versions prior to 4. 2 that allows attackers to bypass file upload restrictions by embedding disallowed file types inside ZIP archives. The platform’s built-in decompression extracts these files without proper validation, enabling potentially dangerous file uploads. Although the vulnerability does not directly impact confidentiality or availability, it can lead to integrity issues if malicious files are uploaded and executed. Exploitation requires network access and low privileges but no user interaction. The issue has been patched in version 4. 2. European educational institutions using vulnerable Open eClass versions should prioritize updating to mitigate risks. Countries with widespread adoption of Open eClass and significant educational infrastructure are most at risk. Mitigations include upgrading to version 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:57:54 UTC

Technical Analysis

The vulnerability identified as CVE-2026-24673 affects the Open eClass platform, a widely used course management system, formerly known as GUnet eClass. Prior to version 4.2, the platform’s file upload mechanism inadequately validates file types when users upload compressed ZIP archives. Attackers can embed files with prohibited or dangerous extensions inside these archives, which the platform then decompresses and stores without proper extension or content validation. This bypasses the intended file upload restrictions, classified under CWE-434: Unrestricted Upload of File with Dangerous Type. Although the CVSS score is 4.3 (medium severity), the vulnerability primarily threatens the integrity of the system by allowing potentially malicious files to be introduced. The attack vector is network-based with low complexity and requires only low privileges, but no user interaction is necessary. No known exploits are currently reported in the wild. The vulnerability has been addressed in Open eClass version 4.2, which includes improved validation during decompression and file handling to prevent such bypasses. This flaw could be leveraged by attackers to upload scripts or executables that might be used for further exploitation, such as privilege escalation or lateral movement within affected educational environments.

Potential Impact

For European organizations, particularly educational institutions using Open eClass versions prior to 4.2, this vulnerability poses a risk of unauthorized file uploads that can compromise system integrity. While it does not directly affect confidentiality or availability, malicious files uploaded through this flaw could be used to execute unauthorized code, implant malware, or manipulate course content, potentially disrupting educational services or damaging institutional reputation. The impact is heightened in environments where Open eClass is integrated with other critical systems or where uploaded files are executed or served to users. Given the widespread use of Open eClass in European academic institutions, exploitation could lead to localized incidents of data tampering or service misuse. However, the lack of known active exploits and the medium CVSS score suggest the threat is moderate but should not be underestimated due to the sensitive nature of educational data and services.

Mitigation Recommendations

The primary mitigation is to upgrade all Open eClass deployments to version 4.2 or later, where the vulnerability has been patched. Organizations should audit their current versions and prioritize updates accordingly. In addition, implement strict server-side validation of uploaded files beyond extension checks, including MIME type verification and content inspection, especially for compressed archives. Employ sandboxing or isolated environments for handling file decompression to prevent malicious code execution. Monitor file upload logs for unusual patterns, such as frequent ZIP uploads or files with suspicious nested content. Educate administrators and users about the risks of uploading untrusted files. If immediate upgrading is not feasible, consider disabling file upload features temporarily or restricting upload permissions to trusted users only. Regularly review and update security policies related to file handling in the platform.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f7664a8

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/11/2026, 11:57:54 AM

Last updated: 3/25/2026, 3:34:33 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses