Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, failure to invalidate active user sessions after a password change allows existing session tokens to remain valid, potentially enabling unauthorized continued access to user accounts. This issue has been patched in version 4.2.
Published: 2026-02-03
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Account hijacking via persistent session tokens
Action: Update
AI Analysis

Impact

Active user sessions in the Open eClass platform are not cleared when a password change occurs, which means a session token that was issued before the password was changed can still be used, allowing an attacker to maintain access to an account without needing the new credentials. This flaw enables the persistence of a compromised session and therefore can lead to unauthorized disclosure, tampering, or destruction of a user’s data, classified as a session hijacking weakness (CWE-613).

Affected Systems

The issue affects the Open eClass community edition released as gunet:openeclass. Versions built from source prior to 4.2 are vulnerable; the fix was included in release 4.2 and later.

Risk and Exploitability

The base severity of the vulnerability is a moderate CVSS score of 5.0, and the EPSS score indicates an exploitation probability of less than 1%. The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the likely attack vector is an authenticated or partially authenticated operation where the attacker already possesses a valid session cookie or token; the attacker could also acquire a session token through other vulnerabilities such as XSS, but this is not explicitly disclosed. Exploitation requires that the attacker leverage a session that remained active after a password change and does not involve a separate vulnerability to obtain that token. The risk is that an attacker who gains ownership of a session token can continue to use the account with no indication of the password change; ongoing monitoring of session activity and audit logs is advised.

Generated by OpenCVE AI on April 18, 2026 at 00:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official update to Open eClass version 4.2 or later to ensure that session tokens are invalidated immediately after a password change.
  • If upgrading is not possible, enforce a manual session flush (remove all active session records) immediately following any password change through custom administrative scripts or database operations.
  • Implement monitoring to detect any sessions that persist beyond a password change event, and audit user activity logs for suspicious continued access.

Generated by OpenCVE AI on April 18, 2026 at 00:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Gunet
Gunet open Eclass Platform
CPEs cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*
Vendors & Products Gunet
Gunet open Eclass Platform

Wed, 04 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Openeclass
Openeclass openeclass
Vendors & Products Openeclass
Openeclass openeclass

Tue, 03 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, failure to invalidate active user sessions after a password change allows existing session tokens to remain valid, potentially enabling unauthorized continued access to user accounts. This issue has been patched in version 4.2.
Title Open eClass's Active Sessions Not Invalidated After Password Change Allow Persistent Account Access
Weaknesses CWE-613
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

Gunet Open Eclass Platform
Openeclass Openeclass
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T16:51:49.025Z

Reserved: 2026-01-23T20:40:23.387Z

Link: CVE-2026-24667

cve-icon Vulnrichment

Updated: 2026-02-04T15:46:29.606Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T18:16:19.917

Modified: 2026-02-10T18:35:19.530

Link: CVE-2026-24667

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:30:25Z

Weaknesses