CVE-2026-24668
Unknown Unknown - Not Provided
Broken Access Control in Open eClass Allows Unauthorized Content Modification

Publication date: 2026-02-03

Last updated on: 2026-02-10

Assigner: GitHub, Inc.

Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a broken access control vulnerability allows authenticated students to add content to existing course units, an action normally restricted to higher-privileged roles. This issue has been patched in version 4.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gunet open_eclass_platform to 4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-24668 is a broken access control vulnerability in the Open eClass platform versions up to 4.1. It allows authenticated users with the student role to add content to existing course units, which is normally restricted to instructors or administrators.'}, {'type': 'paragraph', 'content': "This happens because the system's /modules/units/insert.php endpoint lacks proper authorization checks, enabling students to modify course materials and structure without the required privileges."}, {'type': 'paragraph', 'content': 'The vulnerability can be exploited by a student who authenticates, identifies a course unit, and sends a specially crafted POST request to add content.'}] [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized users (students) to modify course content, potentially leading to misinformation, disruption of course structure, or unauthorized changes that could affect the integrity of educational materials.

Since the integrity of course content is compromised, it may undermine trust in the platform and cause administrative overhead to detect and correct unauthorized changes.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated students to add content to existing course units, which is normally restricted to higher-privileged roles. This improper access control could lead to unauthorized modification of course materials and structure.

While the CVE description and resources do not explicitly mention compliance with standards such as GDPR or HIPAA, the unauthorized modification of course content could potentially impact data integrity requirements under such regulations.

However, there is no direct information provided about how this vulnerability affects compliance with these regulations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by verifying if authenticated users with the student role are able to send POST requests to the /modules/units/insert.php endpoint to add content to existing course units, which should normally be restricted.'}, {'type': 'paragraph', 'content': 'A practical detection method involves authenticating as a student user and attempting to add content via a POST request to the affected endpoint. If the request succeeds, the system is vulnerable.'}, {'type': 'paragraph', 'content': 'Example command using curl to test the vulnerability:'}, {'type': 'list_item', 'content': 'curl -X POST -b "cookie=student_session_cookie" -d "unit_id=COURSE_UNIT_ID&content=TEST_CONTENT" https://your-openeclass-domain/modules/units/insert.php'}, {'type': 'paragraph', 'content': 'Replace "student_session_cookie" with a valid authenticated session cookie for a student user, "COURSE_UNIT_ID" with an existing course unit identifier, and "TEST_CONTENT" with the content you want to attempt to add.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Open eClass platform to version 4.2 or later, where this broken access control vulnerability has been patched.

Until the upgrade can be performed, restrict access to the /modules/units/insert.php endpoint to only authorized roles (instructors or administrators) by implementing additional access control measures at the web server or application level.

Additionally, monitor and audit logs for any unauthorized POST requests to the affected endpoint from student accounts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart