Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24673: CWE-434: Unrestricted Upload of File with Dangerous Type in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24673cvecve-2026-24673cwe-434
Published: Tue Feb 03 2026 (02/03/2026, 16:56:59 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a file upload validation bypass vulnerability allows attackers to upload files with prohibited extensions by embedding them inside ZIP archives and extracting them using the application’s built-in decompression functionality. This issue has been patched in version 4.2.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:18:38 UTC

Technical Analysis

The vulnerability identified as CVE-2026-24673 affects the Open eClass platform, a widely used course management system, formerly known as GUnet eClass. In versions prior to 4.2, the platform improperly validates uploaded files, allowing attackers to circumvent file type restrictions by embedding disallowed file types within ZIP archives. When the application decompresses these archives using its built-in functionality, it extracts and stores files that should have been blocked, effectively bypassing the intended security controls. This vulnerability is categorized under CWE-434, which concerns unrestricted file upload of dangerous types. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires low privileges (PR:L), and no user interaction (UI:N). The impact is limited to integrity as attackers can upload potentially malicious files, which could be used for further attacks such as web shell deployment or defacement, but does not directly compromise confidentiality or availability. No known exploits are currently reported in the wild. The vulnerability was publicly disclosed on February 3, 2026, and fixed in Open eClass version 4.2. The lack of patch links suggests users should refer to official vendor resources for updates. The issue highlights the risks of insufficient file validation combined with decompression features in web applications handling user uploads.

Potential Impact

For European organizations, particularly educational institutions and universities using Open eClass, this vulnerability poses a risk of unauthorized file uploads that could lead to integrity breaches. Attackers could upload malicious scripts or executables disguised within ZIP files, potentially enabling web shell access or defacement of course materials. While confidentiality and availability impacts are limited, the integrity compromise could disrupt educational services and damage institutional reputation. Given the widespread use of Open eClass in Greece and other European countries, exploitation could affect sensitive academic data and user trust. The vulnerability could also serve as a foothold for lateral movement or further attacks within the network if combined with other vulnerabilities. Organizations failing to upgrade or implement compensating controls remain exposed to these risks.

Mitigation Recommendations

The primary mitigation is to upgrade Open eClass installations to version 4.2 or later, where the vulnerability has been patched. In addition, organizations should implement strict server-side validation of uploaded files, including verifying file extensions, MIME types, and scanning contents for malicious code before decompression. Disabling or restricting automatic decompression of user-uploaded archives can reduce risk. Employing application-layer firewalls or intrusion detection systems to monitor and block suspicious upload activity is recommended. Regularly auditing file upload directories and permissions can help detect and contain unauthorized files. Educating administrators about the risks of file upload vulnerabilities and maintaining timely patch management processes are essential to prevent exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-23T20:40:23.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd8f9fa50a62f7664a8

Added to database: 2/4/2026, 8:01:28 AM

Last enriched: 2/4/2026, 8:18:38 AM

Last updated: 2/7/2026, 2:31:13 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats