CVE-2020-37112

GUnet OpenEclass 1.7.3 contains multiple SQL injection vulnerabilities that allow authenticated attackers to manipulate database queries through unvalidated parameters. Attackers can exploit the 'month' parameter in the agenda module and other endpoints to extract sensitive database information using error-based or time-based injection techniques.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gunet:open_eclass_platform:1.7.3:*:*:*:*:*:*:*

History

12 Feb 2026, 18:28

Type Values Removed Values Added
CPE cpe:2.3:a:gunet:open_eclass_platform:1.7.3:*:*:*:*:*:*:*
First Time Gunet
Gunet open Eclass Platform
References () https://download.openeclass.org/files/docs/1.7/CHANGES.txt - () https://download.openeclass.org/files/docs/1.7/CHANGES.txt - Release Notes
References () https://www.exploit-db.com/exploits/48163 - () https://www.exploit-db.com/exploits/48163 - Exploit, Third Party Advisory, VDB Entry
References () https://www.openeclass.org/ - () https://www.openeclass.org/ - Product
References () https://www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-month-sql-injection - () https://www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-month-sql-injection - Third Party Advisory

03 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 18:16

Updated : 2026-02-12 18:28


NVD link : CVE-2020-37112

Mitre link : CVE-2020-37112

CVE.ORG link : CVE-2020-37112


JSON object : View

Products Affected

gunet

  • open_eclass_platform
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')