Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated high-privileged users (teachers or administrators) to inject malicious JavaScript into multiple user-controllable input fields across the application, which is executed when other users access affected pages. This issue has been patched in version 4.2.
Published: 2026-02-03
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

The Open eClass platform is vulnerable to a stored cross‑site scripting flaw that allows authenticated teachers or administrators to inject malicious JavaScript into several user‑editable fields. When other users view the affected pages, the injected code executes in their browsers, enabling attacks such as cookie theft, session hijacking, defacement, or further exploitation of client‑side resources. This vulnerability is a classic injection weakness (CWE‑79).

Affected Systems

This flaw exists in all Open eClass releases prior to version 4.2. The affected vendor is Gunet, developer of the Open eClass platform. Users running any version older than 4.2 of Open eClass are susceptible, while version 4.2 and newer contain the patch that removes the susceptibility.

Risk and Exploitability

The CVSS base score of 6.1 places the issue in the medium severity range, and the very low EPSS (<1%) indicates that exploitation is currently rare. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires that an attacker have high‑privileged access (teacher or administrator) to inject the payload. Once injected, the code runs with the victim’s browser privileges, potentially compromising user data and session integrity. The presence of both a credential requirement and a stored payload further limits the attack surface but still poses significant risk to users of affected installations.

Generated by OpenCVE AI on April 18, 2026 at 00:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Open eClass platform to version 4.2 or later, which contains the official fix for this stored XSS vulnerability.
  • Configure the application to enforce strict input validation and sanitization on all user‑controlled fields, ensuring that script tags and event handlers are removed before storage.
  • Deploy a web application firewall or similar filtering solution to detect and block malicious script payloads targeting the susceptible input fields.

Generated by OpenCVE AI on April 18, 2026 at 00:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Gunet
Gunet open Eclass Platform
CPEs cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*
Vendors & Products Gunet
Gunet open Eclass Platform

Wed, 04 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Openeclass
Openeclass openeclass
Vendors & Products Openeclass
Openeclass openeclass

Tue, 03 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated high-privileged users (teachers or administrators) to inject malicious JavaScript into multiple user-controllable input fields across the application, which is executed when other users access affected pages. This issue has been patched in version 4.2.
Title Open eClass is Vulnerable to Stored Cross-Site Scripting (XSS) in Multiple High-Privilege User Fields
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}


Subscriptions

Gunet Open Eclass Platform
Openeclass Openeclass
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T16:52:35.918Z

Reserved: 2026-01-23T20:40:23.387Z

Link: CVE-2026-24671

cve-icon Vulnrichment

Updated: 2026-02-04T15:54:26.106Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T18:16:23.720

Modified: 2026-02-10T18:21:25.530

Link: CVE-2026-24671

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:30:25Z

Weaknesses