CVE-2026-24665

8.7 HIGH

📋 TL;DR

Authenticated students can inject malicious JavaScript into uploaded assignment files in Open eClass platform. When instructors view these submissions, the JavaScript executes in their browser session. This affects all Open eClass installations prior to version 4.2.

💻 Affected Systems

Products:
  • Open eClass (formerly GUnet eClass)
Versions: All versions prior to 4.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires student authentication to exploit, but student accounts are typically easy to obtain in educational environments.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Instructor accounts could be compromised, leading to unauthorized access to sensitive student data, grade manipulation, or complete system takeover if instructors have administrative privileges.

🟠

Likely Case

Attackers could steal instructor session cookies, perform actions as the instructor, or deface assignment pages.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires student-level access but is technically simple - just upload a malicious file with JavaScript payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2

Vendor Advisory: https://github.com/gunet/openeclass/security/advisories/GHSA-2qgm-m7fm-m888

Restart Required: Yes

Instructions:

1. Backup your current installation and database. 2. Download Open eClass version 4.2 or later. 3. Follow the official upgrade documentation at https://docs.openeclass.org/. 4. Restart your web server.

🔧 Temporary Workarounds

Disable file uploads for assignments

all

Temporarily disable file upload functionality for student assignments to prevent exploitation.

Implement WAF rules

all

Configure web application firewall to block JavaScript in uploaded files or suspicious file upload patterns.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources
  • Review and sanitize all uploaded files server-side before allowing instructors to view them

🔍 How to Verify

Check if Vulnerable:

Check if your Open eClass version is below 4.2 by logging into the admin panel and viewing the version information.

Check Version:

Check the version.php file in your Open eClass installation directory or view the footer in the admin interface.

Verify Fix Applied:

After upgrading to 4.2 or later, test by uploading a file with JavaScript content and verifying it doesn't execute when viewed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns from student accounts
  • Assignment files with JavaScript content
  • Multiple failed upload attempts with suspicious filenames

Network Indicators:

  • HTTP requests uploading files with JavaScript content to assignment endpoints
  • Unusual traffic patterns to assignment viewing pages

SIEM Query:

source="web_server" AND (url="*/modules/work/index.php" OR url="*/modules/work/submit.php") AND (file_extension="html" OR file_extension="htm" OR content_contains="<script>")

🔗 References

📤 Share & Export