The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated high-privileged users (teachers or administrators) to inject malicious JavaScript into multiple user-controllable input fields across the application, which is executed when other users access affected pages. This issue has been patched in version 4.2.
References
| Link | Resource |
|---|---|
| https://github.com/gunet/openeclass/security/advisories/GHSA-2x83-4fh2-fcw7 | Exploit Vendor Advisory |
Configurations
History
10 Feb 2026, 18:21
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/gunet/openeclass/security/advisories/GHSA-2x83-4fh2-fcw7 - Exploit, Vendor Advisory | |
| First Time |
Gunet
Gunet open Eclass Platform |
|
| CPE | cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:* |
03 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-03 18:16
Updated : 2026-02-10 18:21
NVD link : CVE-2026-24671
Mitre link : CVE-2026-24671
CVE.ORG link : CVE-2026-24671
JSON object : View
Products Affected
gunet
- open_eclass_platform
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
