Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24774: CWE-841: Improper Enforcement of Behavioral Workflow in gunet openeclass

0
Medium
VulnerabilityCVE-2026-24774cvecve-2026-24774cwe-841
Published: Tue Feb 03 2026 (02/03/2026, 16:58:09 UTC)
Source: CVE Database V5
Vendor/Project: gunet
Product: openeclass

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a business logic vulnerability allows authenticated students to improperly mark themselves as present in attendance activities, including activities that have already expired, by directly accessing a crafted URL. This issue has been patched in version 4.2.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:19:25 UTC

Technical Analysis

CVE-2026-24774 identifies a business logic vulnerability classified under CWE-841 (Improper Enforcement of Behavioral Workflow) in the Open eClass platform, a comprehensive course management system widely used in academic environments. The vulnerability exists in versions prior to 4.2 and allows authenticated students to manipulate attendance records by directly accessing a specially crafted URL. This bypasses the intended workflow controls that prevent marking attendance for expired activities, thereby enabling students to fraudulently mark themselves as present after the attendance period has ended. The flaw does not require elevated privileges beyond student authentication and does not necessitate additional user interaction, making exploitation relatively straightforward for enrolled users. The vulnerability impacts the integrity of attendance data but does not compromise confidentiality or availability of the system. The issue was addressed and patched in Open eClass version 4.2. No public exploits have been reported, indicating limited active exploitation. However, the vulnerability poses risks to the trustworthiness of attendance records, potentially affecting academic assessments and administrative processes. The CVSS v3.1 score of 4.3 reflects a medium severity level, driven by the low complexity of exploitation and limited impact scope. This vulnerability highlights the importance of enforcing strict business logic controls in educational platforms to prevent misuse of workflow functionalities.

Potential Impact

For European organizations, particularly educational institutions using Open eClass, this vulnerability undermines the integrity of attendance tracking, a critical component for academic record-keeping and compliance. Fraudulent attendance marking can lead to inaccurate student participation records, affecting grading, certification, and regulatory reporting. This may result in reputational damage, administrative overhead to audit and correct records, and potential legal or accreditation issues if attendance data is used for funding or compliance purposes. While the vulnerability does not directly threaten system confidentiality or availability, the erosion of data integrity can compromise institutional trust and operational effectiveness. Institutions relying on automated attendance for funding or regulatory compliance are especially vulnerable. The impact is more pronounced in countries where Open eClass has significant adoption in universities and colleges, potentially affecting thousands of students and staff. Given the ease of exploitation by authenticated users, insider threat risk is elevated, necessitating prompt remediation and monitoring.

Mitigation Recommendations

The primary mitigation is to upgrade all Open eClass installations to version 4.2 or later, where the vulnerability has been patched. Institutions should conduct an immediate inventory of affected systems to prioritize updates. In parallel, audit attendance records for suspicious entries, particularly those marked after activity expiration, to identify and correct fraudulent data. Implement stricter access controls and monitoring on attendance modules to detect anomalous URL access patterns indicative of exploitation attempts. Educate students and staff about acceptable use policies and the consequences of attendance fraud. Consider deploying web application firewalls (WAFs) with custom rules to detect and block crafted URL requests targeting attendance marking endpoints. Regularly review and test business logic workflows in the platform to ensure proper enforcement of activity states. Finally, maintain up-to-date backups of attendance data to enable recovery from tampering.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-26T21:06:47.868Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6982fcd9f9fa50a62f767686

Added to database: 2/4/2026, 8:01:29 AM

Last enriched: 2/4/2026, 8:19:25 AM

Last updated: 2/7/2026, 2:29:26 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats