Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gunet
Gunet open Eclass Platform |
|
| CPEs | cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gunet
Gunet open Eclass Platform |
Wed, 04 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openeclass
Openeclass openeclass |
|
| Vendors & Products |
Openeclass
Openeclass openeclass |
Tue, 03 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated high-privileged users (teachers or administrators) to inject malicious JavaScript into multiple user-controllable input fields across the application, which is executed when other users access affected pages. This issue has been patched in version 4.2. | |
| Title | Open eClass is Vulnerable to Stored Cross-Site Scripting (XSS) in Multiple High-Privilege User Fields | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-04T16:52:35.918Z
Reserved: 2026-01-23T20:40:23.387Z
Link: CVE-2026-24671
Updated: 2026-02-04T15:54:26.106Z
Status : Analyzed
Published: 2026-02-03T18:16:23.720
Modified: 2026-02-10T18:21:25.530
Link: CVE-2026-24671
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:09:22Z