CVE-2026-24664

5.3 MEDIUM

📋 TL;DR

CVE-2026-24664 is a username enumeration vulnerability in Open eClass (formerly GUnet eClass) that allows unauthenticated attackers to identify valid user accounts by analyzing differences in login response behavior. This affects all Open eClass installations prior to version 4.2. The vulnerability enables reconnaissance that can facilitate credential stuffing or targeted attacks.

💻 Affected Systems

Products:
  • Open eClass (formerly GUnet eClass)
Versions: All versions prior to 4.2
Operating Systems: All platforms running Open eClass
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the login mechanism response behavior.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers build a complete list of valid usernames, enabling targeted credential stuffing, social engineering, or brute-force attacks that could lead to account compromise and unauthorized access to course materials.

🟠

Likely Case

Attackers enumerate some valid usernames and use them for credential stuffing attacks against reused passwords, potentially gaining access to user accounts.

🟢

If Mitigated

Attackers can identify valid usernames but cannot progress to account compromise due to strong authentication controls like MFA and rate limiting.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Username enumeration vulnerabilities are commonly exploited using automated tools. The advisory provides technical details that could facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2

Vendor Advisory: https://github.com/gunet/openeclass/security/advisories/GHSA-c3wq-m629-5h2j

Restart Required: Yes

Instructions:

1. Backup your Open eClass installation and database. 2. Download Open eClass version 4.2 from the official repository. 3. Follow the upgrade instructions in the documentation. 4. Restart the web server and verify the upgrade.

🔧 Temporary Workarounds

Implement Web Application Firewall (WAF) Rules

all

Configure WAF rules to detect and block username enumeration attempts by monitoring login request patterns and response analysis.

Rate Limit Login Endpoints

all

Implement strict rate limiting on login endpoints to slow down enumeration attempts.

🧯 If You Can't Patch

  • Implement strong authentication controls including multi-factor authentication (MFA) for all users
  • Deploy network monitoring to detect enumeration patterns and block suspicious IP addresses

🔍 How to Verify

Check if Vulnerable:

Test login endpoint with valid and invalid usernames and compare response times, error messages, or HTTP status codes for differences.

Check Version:

Check the version in the Open eClass admin panel or examine the source code version files.

Verify Fix Applied:

After upgrading to version 4.2, test that login responses are identical for both valid and invalid usernames (same timing, same error messages).

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts with different usernames from same IP
  • Pattern of login requests with incremental usernames

Network Indicators:

  • Unusual volume of POST requests to login endpoint
  • Requests with systematically varied username parameters

SIEM Query:

source="web_logs" AND uri_path="/login" AND (status_code=401 OR status_code=200) | stats count by src_ip, username | where count > threshold

🔗 References

📤 Share & Export