CVE-2020-37115

GUnet OpenEclass 1.7.3 stores user credentials in plaintext, allowing administrators to view all registered users' usernames and passwords without encryption. This vulnerability exposes sensitive information and increases the risk of credential theft and unauthorized access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gunet:open_eclass_platform:1.7.3:*:*:*:*:*:*:*

History

10 Feb 2026, 21:10

Type Values Removed Values Added
CPE cpe:2.3:a:gunet:open_eclass_platform:1.7.3:*:*:*:*:*:*:*
First Time Gunet
Gunet open Eclass Platform
References () https://download.openeclass.org/files/docs/1.7/CHANGES.txt - () https://download.openeclass.org/files/docs/1.7/CHANGES.txt - Release Notes
References () https://www.exploit-db.com/exploits/48163 - () https://www.exploit-db.com/exploits/48163 - Exploit, Third Party Advisory, VDB Entry
References () https://www.openeclass.org/ - () https://www.openeclass.org/ - Product
References () https://www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-plaintext-password-storage - () https://www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-plaintext-password-storage - Third Party Advisory

03 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 18:16

Updated : 2026-02-10 21:10


NVD link : CVE-2020-37115

Mitre link : CVE-2020-37115

CVE.ORG link : CVE-2020-37115


JSON object : View

Products Affected

gunet

  • open_eclass_platform
CWE
CWE-256

Plaintext Storage of a Password