GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.
References
| Link | Resource |
|---|---|
| https://download.openeclass.org/files/docs/1.7/CHANGES.txt | Release Notes |
| https://www.exploit-db.com/exploits/48163 | Exploit Third Party Advisory VDB Entry |
| https://www.openeclass.org/ | Product |
| https://www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-file-upload-extension-bypass | Third Party Advisory |
Configurations
History
12 Feb 2026, 18:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Gunet
Gunet open Eclass Platform |
|
| CPE | cpe:2.3:a:gunet:open_eclass_platform:1.7.3:*:*:*:*:*:*:* | |
| References | () https://download.openeclass.org/files/docs/1.7/CHANGES.txt - Release Notes | |
| References | () https://www.exploit-db.com/exploits/48163 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.openeclass.org/ - Product | |
| References | () https://www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-file-upload-extension-bypass - Third Party Advisory |
03 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-03 18:16
Updated : 2026-02-12 18:33
NVD link : CVE-2020-37113
Mitre link : CVE-2020-37113
CVE.ORG link : CVE-2020-37113
JSON object : View
Products Affected
gunet
- open_eclass_platform
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
