Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a business logic vulnerability allows authenticated students to improperly mark themselves as present in attendance activities, including activities that have already expired, by directly accessing a crafted URL. This issue has been patched in version 4.2.
Published: 2026-02-03
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Business logic flaw allowing attendance fraud
Action: Patch
AI Analysis

Impact

The Open eClass platform contains a business logic flaw that allows authenticated students to mark themselves as present in attendance activities that have already expired by directly accessing a crafted URL. This flaw enables dishonest attendance, potentially affecting academic integrity and any systems that tie attendance to grading or benefits. The weakness is classified as CWE-841, indicating improper authorization.

Affected Systems

The vulnerability impacts the Open eClass platform (formerly GUnet eClass) sold by gunet. All releases prior to version 4.2 are affected, while version 4.2 and later contain the fix. Administrators should verify that their installations run 4.2 or newer.

Risk and Exploitability

The CVSS score is 4.3, reflecting moderate severity. The EPSS score is below 1%, suggesting a low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a remote authenticated student who crafts the URL; the attack requires valid student credentials and can only affect courses where the activity has already expired. The impact is limited to attendance records for the affected courses, but repeated use could undermine grading integrity.

Generated by OpenCVE AI on April 18, 2026 at 00:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Open eClass platform to version 4.2 or later to apply the business‑logic fix.
  • Disable or restrict direct URL access to the attendance‑marking endpoint for courses that have concluded, ensuring only scheduled processes can record presence.
  • Audit attendance logs for courses where users were present after the activity end date, and correct any discrepancies.

Generated by OpenCVE AI on April 18, 2026 at 00:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Gunet
Gunet open Eclass Platform
CPEs cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*
Vendors & Products Gunet
Gunet open Eclass Platform

Wed, 04 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Openeclass
Openeclass openeclass
Vendors & Products Openeclass
Openeclass openeclass

Tue, 03 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a business logic vulnerability allows authenticated students to improperly mark themselves as present in attendance activities, including activities that have already expired, by directly accessing a crafted URL. This issue has been patched in version 4.2.
Title Open eClass Business Logic Flaw Allows Students to Mark Attendance in Expired Activities
Weaknesses CWE-841
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Gunet Open Eclass Platform
Openeclass Openeclass
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T16:52:06.935Z

Reserved: 2026-01-26T21:06:47.868Z

Link: CVE-2026-24774

cve-icon Vulnrichment

Updated: 2026-02-04T15:46:33.533Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T18:16:24.520

Modified: 2026-02-10T17:24:23.640

Link: CVE-2026-24774

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:30:25Z

Weaknesses