CVE-2026-24666

6.5 MEDIUM

📋 TL;DR

This CSRF vulnerability in Open eClass allows attackers to trick authenticated teachers into performing unauthorized actions like modifying assignment grades by sending crafted requests. It affects all Open eClass installations prior to version 4.2 where teachers access the platform.

💻 Affected Systems

Products:
  • Open eClass (formerly GUnet eClass)
Versions: All versions prior to 4.2
Operating Systems: Any OS running Open eClass
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installations; requires teacher authentication to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could systematically alter grades for entire classes, delete course materials, or modify critical course settings, potentially compromising academic integrity and causing operational disruption.

🟠

Likely Case

Targeted grade manipulation for specific students or unauthorized modifications to assignment settings, leading to academic record inaccuracies and administrative overhead.

🟢

If Mitigated

Limited impact with proper CSRF protections and user awareness, potentially catching suspicious activity through monitoring.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated teachers into clicking malicious links while logged in.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2

Vendor Advisory: https://github.com/gunet/openeclass/security/advisories/GHSA-cgmh-73qg-28fm

Restart Required: Yes

Instructions:

1. Backup your Open eClass installation and database. 2. Download version 4.2 from the official repository. 3. Replace existing files with the patched version. 4. Run any database update scripts if provided. 5. Restart the web server.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Manually add CSRF protection to teacher-restricted endpoints if immediate patching isn't possible.

Session Timeout Reduction

all

Reduce session timeout durations to limit exposure windows for CSRF attacks.

Modify session configuration in application settings to reduce timeout values

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies for session cookies
  • Educate teachers about the risks of clicking unknown links while authenticated

🔍 How to Verify

Check if Vulnerable:

Check if your Open eClass version is below 4.2 by examining the version file or admin panel.

Check Version:

Check the version.txt file in the installation directory or view the admin panel version information.

Verify Fix Applied:

Confirm installation of version 4.2 and test teacher endpoints for CSRF token implementation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple grade modification requests from same teacher in short timeframe
  • Requests to teacher endpoints without proper referrer headers

Network Indicators:

  • HTTP POST requests to teacher endpoints without CSRF tokens
  • Suspicious referrer domains in teacher endpoint requests

SIEM Query:

source="web_server" AND (uri="/teacher/*" OR uri="/courses/*/teacher/*") AND method="POST" AND NOT csrf_token=*

🔗 References

📤 Share & Export