CVE-2026-24667
Session Fixation in Open eClass Allows Unauthorized Access
Publication date: 2026-02-03
Last updated on: 2026-02-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gunet | open_eclass_platform | to 4.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-613 | According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization." |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-24667 is a moderate severity vulnerability affecting Open eClass versions up to 4.1. The issue occurs because the platform fails to invalidate active user sessions after a password change. This means that session tokens, such as the PHPSESSID, remain valid even after the user updates their password.
As a result, any existing sessionsβincluding those potentially established by attackers through session cookie theft or on other devicesβremain active indefinitely despite the password update. This flaw allows unauthorized users to maintain access to user accounts without needing to re-authenticate.
The underlying weakness is classified as CWE-613: Insufficient Session Expiration, where old session credentials or session IDs can be reused for authorization.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized continued access to your user account even after you have changed your password. If an attacker has obtained your session token, they can maintain access without needing your new password.
This persistent unauthorized access can compromise the confidentiality, integrity, and availability of your account and its data, although the impact level is considered low.
Because the vulnerability requires low privileges and no user interaction, it can be exploited relatively easily if session tokens are exposed.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by verifying whether active user sessions remain valid after a password change in Open eClass versions prior to 4.2.'}, {'type': 'paragraph', 'content': "One way to test this is to log in as a user, capture the session cookie (PHPSESSID), then change the user's password and attempt to use the old session cookie to access the system without re-authenticating."}, {'type': 'paragraph', 'content': 'Commands or steps to detect this might include:'}, {'type': 'list_item', 'content': 'Use a web proxy tool (e.g., Burp Suite or OWASP ZAP) to intercept and save the session cookie.'}, {'type': 'list_item', 'content': 'Change the user password via the application interface.'}, {'type': 'list_item', 'content': 'Attempt to reuse the old session cookie by setting it in the browser or via curl commands to see if access is still granted.'}, {'type': 'list_item', 'content': 'Example curl command to test session reuse:'}, {'type': 'list_item', 'content': 'curl -b "PHPSESSID=<old_session_id>" https://<openeclass_url>/'}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows active user sessions to remain valid after a password change, potentially enabling unauthorized continued access to user accounts. This persistent unauthorized access can lead to confidentiality, integrity, and availability impacts, albeit at a low level.
Such a flaw in session management could negatively affect compliance with standards and regulations like GDPR and HIPAA, which require protecting user data and ensuring secure authentication mechanisms to prevent unauthorized access.
Specifically, failure to invalidate sessions after password changes may violate principles of data protection and access control mandated by these regulations, increasing the risk of data breaches and unauthorized data exposure.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Open eClass to version 4.2 or later, where this vulnerability has been patched.
If upgrading immediately is not possible, consider implementing manual session invalidation upon password changes by clearing or expiring all active sessions for the user.
Additionally, enforce strong password policies and monitor for suspicious session activity.