Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Cross-Site Request Forgery (CSRF) vulnerability in multiple teacher-restricted endpoints allows attackers to induce authenticated teachers to perform unintended actions, such as modifying assignment grades, via crafted requests. This issue has been patched in version 4.2.
Published: 2026-02-03
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery (unauthorized teacher actions)
Action: Patch Now
AI Analysis

Impact

The Open eClass platform suffers from a CSRF flaw affecting several teacher‑restricted API endpoints. An attacker can craft a malicious request that, when viewed by an authenticated teacher, triggers unintended operations such as changing assignment grades. The vulnerability is rooted in CWE‑352, allowing session hijacking through forged requests.

Affected Systems

All Open eClass installations running a version earlier than 4.2 are vulnerable. This includes every deployment of the platform that has not yet incorporated the patch delivered in release 4.2.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.5, indicating a moderate severity. The EPSS score is below 1 %, showing a low probability of exploitation in the wild, and the issue is not listed in CISA’s KEV catalog. Exploitation requires an attacker to get a teacher to load a crafted request, typically via phishing or a malicious web page, while their browser maintains an authenticated session. Given the lack of known active exploits and the low EPSS, the immediate risk is moderate but should be mitigated promptly to prevent potential credential‑reuse and data‑manipulation attacks.

Generated by OpenCVE AI on April 18, 2026 at 00:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the vendor‑supplied patch to version 4.2 or later.
  • Ensure that all teacher‑restricted endpoints require valid anti‑CSRF tokens and that session cookies use SameSite=Strict or Lax to impede cross‑origin requests.
  • Audit current endpoints for missing CSRF protection and remediate any that still accept forged requests.

Generated by OpenCVE AI on April 18, 2026 at 00:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Gunet
Gunet open Eclass Platform
CPEs cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*
Vendors & Products Gunet
Gunet open Eclass Platform

Wed, 04 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Openeclass
Openeclass openeclass
Vendors & Products Openeclass
Openeclass openeclass

Tue, 03 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Cross-Site Request Forgery (CSRF) vulnerability in multiple teacher-restricted endpoints allows attackers to induce authenticated teachers to perform unintended actions, such as modifying assignment grades, via crafted requests. This issue has been patched in version 4.2.
Title Open eClass is Vulnerable to CSRF in Teacher-Restricted Endpoints Allows Unauthorized Actions
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}


Subscriptions

Gunet Open Eclass Platform
Openeclass Openeclass
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T16:51:54.343Z

Reserved: 2026-01-23T20:40:23.387Z

Link: CVE-2026-24666

cve-icon Vulnrichment

Updated: 2026-02-04T15:46:31.288Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T18:16:19.690

Modified: 2026-02-10T18:47:52.970

Link: CVE-2026-24666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:30:25Z

Weaknesses