CVE-2026-24672

7.3 HIGH

📋 TL;DR

Authenticated students in Open eClass platform can inject malicious JavaScript into user profile fields, which executes when other users view those profiles. This stored XSS vulnerability affects all Open eClass installations prior to version 4.2. The vulnerability requires student-level authentication but can impact any user with profile viewing privileges.

💻 Affected Systems

Products:
  • Open eClass (formerly GUnet eClass)
Versions: All versions prior to 4.2
Operating Systems: All platforms running Open eClass
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with student accounts enabled. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform account takeovers, redirect users to malicious sites, or deploy ransomware-like payloads across the entire user base.

🟠

Likely Case

Session hijacking, credential theft, defacement of user profiles, and limited data exfiltration from affected users.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only affecting users who directly interact with malicious profiles.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires student-level authentication. Exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2

Vendor Advisory: https://github.com/gunet/openeclass/security/advisories/GHSA-3p2x-qgxw-qvxh

Restart Required: Yes

Instructions:

1. Backup your current installation and database. 2. Download Open eClass version 4.2 from the official repository. 3. Follow the upgrade instructions in the documentation. 4. Restart your web server. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize user profile fields

Modify user profile handling code to strip/escape HTML/JavaScript tags

Content Security Policy

all

Implement strict CSP headers to prevent script execution

Add 'Content-Security-Policy: script-src 'self'' to HTTP headers

🧯 If You Can't Patch

  • Disable student profile editing functionality
  • Implement web application firewall rules to block XSS payloads in profile data

🔍 How to Verify

Check if Vulnerable:

Check if your Open eClass version is below 4.2. Attempt to inject basic XSS payloads into user profile fields as a student account.

Check Version:

Check the version.php file or admin dashboard for version information

Verify Fix Applied:

After upgrading to 4.2, attempt to inject XSS payloads into profile fields and verify they are properly sanitized and do not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual profile field updates containing script tags or JavaScript code
  • Multiple failed XSS attempts in user input logs

Network Indicators:

  • Unexpected external requests from user profile pages
  • Suspicious JavaScript payloads in HTTP POST requests to profile endpoints

SIEM Query:

source="web_logs" AND ("<script" OR "javascript:" OR "onload=" OR "onerror=") AND uri="/user/profile/update"

🔗 References

📤 Share & Export