CVE-2026-24668

6.5 MEDIUM

📋 TL;DR

CVE-2026-24668 is a broken access control vulnerability in Open eClass (formerly GUnet eClass) course management systems. Authenticated students can add content to course units, which should be restricted to higher-privileged roles like instructors or administrators. This affects all Open eClass installations prior to version 4.2.

💻 Affected Systems

Products:
  • Open eClass
  • GUnet eClass
Versions: All versions prior to 4.2
Operating Systems: Any OS running Open eClass
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all standard installations where student accounts exist. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Students could upload malicious content, modify course materials to include phishing links or malware, or disrupt course operations by adding inappropriate content to multiple courses.

🟠

Likely Case

Students adding unauthorized content to courses they're enrolled in, potentially disrupting learning or violating academic integrity policies.

🟢

If Mitigated

Limited to minor content additions by enrolled students, with monitoring catching unauthorized changes quickly.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated student account. The vulnerability is straightforward - students can access functionality intended only for higher-privileged roles.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2

Vendor Advisory: https://github.com/gunet/openeclass/security/advisories/GHSA-22cq-9fr7-fq6v

Restart Required: Yes

Instructions:

1. Backup your current installation and database. 2. Download Open eClass version 4.2 or later from the official repository. 3. Follow the upgrade instructions in the documentation. 4. Restart the web server and verify the upgrade completed successfully.

🔧 Temporary Workarounds

Temporary role-based restrictions

all

Manually review and restrict student permissions in the system configuration

🧯 If You Can't Patch

  • Implement strict monitoring of course content changes and alert on any student-initiated modifications
  • Temporarily disable student content upload capabilities through configuration changes

🔍 How to Verify

Check if Vulnerable:

Check if your Open eClass version is below 4.2. Log in as a student and attempt to add content to a course unit where you shouldn't have permission.

Check Version:

Check the version in the admin panel or look at the CHANGELOG.md file in the installation directory.

Verify Fix Applied:

After upgrading to 4.2 or later, verify that student accounts can no longer add content to course units. Test with a student account to confirm proper access controls.

📡 Detection & Monitoring

Log Indicators:

  • Student accounts performing content addition operations
  • Unauthorized POST requests to course unit endpoints

Network Indicators:

  • HTTP POST requests to course content endpoints from student accounts

SIEM Query:

source="openeclass" AND (event_type="content_add" OR event_type="course_modify") AND user_role="student"

🔗 References

📤 Share & Export