CVE-2020-37116
Unknown Unknown - Not Provided
Remote Code Execution via phpMyAdmin in GUnet OpenEclass

Publication date: 2026-02-03

Last updated on: 2026-02-10

Assigner: VulnCheck

Description
GUnet OpenEclass 1.7.3 includes phpMyAdmin 2.10.0.2 by default, which allows remote logins. Attackers with access to the platform can remotely access phpMyAdmin and, after uploading a shell, view the config.php file to obtain the MySQL password, leading to full database compromise.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gunet open_eclass_platform 1.7.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

[{'type': 'paragraph', 'content': "This vulnerability allows attackers to gain unauthorized remote access to phpMyAdmin, upload malicious shells, and obtain database credentials, leading to full compromise of the database's confidentiality, integrity, and availability."}, {'type': 'paragraph', 'content': 'Such a compromise can result in unauthorized access to sensitive personal or protected health information stored in the database, which may violate compliance requirements under standards like GDPR and HIPAA that mandate strict controls over data confidentiality and integrity.'}, {'type': 'paragraph', 'content': 'Therefore, exploitation of this vulnerability could lead to non-compliance with these regulations due to potential data breaches and failure to protect sensitive data adequately.'}] [1]


Can you explain this vulnerability to me?

GUnet OpenEclass version 1.7.3 includes phpMyAdmin 2.10.0.2 by default, which has a critical security vulnerability identified as CVE-2020-37116.

This vulnerability is due to improper access control (CWE-284) that allows attackers who have access to the platform to remotely log into phpMyAdmin without proper restrictions.

Once logged in, an attacker can upload a malicious shell, which enables them to read the config.php file and extract the MySQL database password.

This leads to a full compromise of the database, affecting confidentiality, integrity, and availability.


How can this vulnerability impact me? :

Exploiting this vulnerability can lead to a full compromise of the MySQL database used by the GUnet OpenEclass platform.

  • Attackers can gain unauthorized remote access to phpMyAdmin.
  • They can upload malicious shells to the server.
  • They can read sensitive configuration files such as config.php to obtain database credentials.
  • This results in loss of confidentiality, integrity, and availability of the database.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the vulnerable version of phpMyAdmin (2.10.0.2) is accessible remotely on the GUnet OpenEclass 1.7.3 platform. Since the issue involves unauthorized remote login and the ability to upload shells, detection involves verifying access to phpMyAdmin and inspecting for suspicious files or activities.

  • Use network scanning tools (e.g., nmap) to detect if phpMyAdmin is accessible on the network.
  • Run a command like: curl -I http://<target-ip>/phpmyadmin/ to check if the phpMyAdmin interface is reachable.
  • Check for the presence of uploaded shells or suspicious files in the phpMyAdmin directory on the server.
  • Review web server logs for unusual POST requests or file uploads to the phpMyAdmin path.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable phpMyAdmin instance, removing or upgrading the vulnerable version, and monitoring for any signs of compromise.

  • Restrict network access to phpMyAdmin by limiting it to trusted IP addresses or internal networks.
  • Disable or remove the default phpMyAdmin 2.10.0.2 bundled with GUnet OpenEclass 1.7.3.
  • Upgrade phpMyAdmin to a secure, supported version that does not have this vulnerability.
  • Change MySQL passwords and review database access logs for suspicious activity.
  • Monitor the system for any uploaded shells or unauthorized access attempts.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart