CVE-2026-24667
Unknown Unknown - Not Provided
Session Fixation in Open eClass Allows Unauthorized Access

Publication date: 2026-02-03

Last updated on: 2026-02-10

Assigner: GitHub, Inc.

Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, failure to invalidate active user sessions after a password change allows existing session tokens to remain valid, potentially enabling unauthorized continued access to user accounts. This issue has been patched in version 4.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gunet open_eclass_platform to 4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-613 According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-24667 is a moderate severity vulnerability affecting Open eClass versions up to 4.1. The issue occurs because the platform fails to invalidate active user sessions after a password change. This means that session tokens, such as the PHPSESSID, remain valid even after the user updates their password.

As a result, any existing sessionsβ€”including those potentially established by attackers through session cookie theft or on other devicesβ€”remain active indefinitely despite the password update. This flaw allows unauthorized users to maintain access to user accounts without needing to re-authenticate.

The underlying weakness is classified as CWE-613: Insufficient Session Expiration, where old session credentials or session IDs can be reused for authorization.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized continued access to your user account even after you have changed your password. If an attacker has obtained your session token, they can maintain access without needing your new password.

This persistent unauthorized access can compromise the confidentiality, integrity, and availability of your account and its data, although the impact level is considered low.

Because the vulnerability requires low privileges and no user interaction, it can be exploited relatively easily if session tokens are exposed.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by verifying whether active user sessions remain valid after a password change in Open eClass versions prior to 4.2.'}, {'type': 'paragraph', 'content': "One way to test this is to log in as a user, capture the session cookie (PHPSESSID), then change the user's password and attempt to use the old session cookie to access the system without re-authenticating."}, {'type': 'paragraph', 'content': 'Commands or steps to detect this might include:'}, {'type': 'list_item', 'content': 'Use a web proxy tool (e.g., Burp Suite or OWASP ZAP) to intercept and save the session cookie.'}, {'type': 'list_item', 'content': 'Change the user password via the application interface.'}, {'type': 'list_item', 'content': 'Attempt to reuse the old session cookie by setting it in the browser or via curl commands to see if access is still granted.'}, {'type': 'list_item', 'content': 'Example curl command to test session reuse:'}, {'type': 'list_item', 'content': 'curl -b "PHPSESSID=<old_session_id>" https://<openeclass_url>/'}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows active user sessions to remain valid after a password change, potentially enabling unauthorized continued access to user accounts. This persistent unauthorized access can lead to confidentiality, integrity, and availability impacts, albeit at a low level.

Such a flaw in session management could negatively affect compliance with standards and regulations like GDPR and HIPAA, which require protecting user data and ensuring secure authentication mechanisms to prevent unauthorized access.

Specifically, failure to invalidate sessions after password changes may violate principles of data protection and access control mandated by these regulations, increasing the risk of data breaches and unauthorized data exposure.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Open eClass to version 4.2 or later, where this vulnerability has been patched.

If upgrading immediately is not possible, consider implementing manual session invalidation upon password changes by clearing or expiring all active sessions for the user.

Additionally, enforce strong password policies and monitor for suspicious session activity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart