CVE-2026-24668
Broken Access Control in Open eClass Allows Unauthorized Content Modification
Publication date: 2026-02-03
Last updated on: 2026-02-10
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gunet | open_eclass_platform | to 4.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-24668 is a broken access control vulnerability in the Open eClass platform versions up to 4.1. It allows authenticated users with the student role to add content to existing course units, which is normally restricted to instructors or administrators.'}, {'type': 'paragraph', 'content': "This happens because the system's /modules/units/insert.php endpoint lacks proper authorization checks, enabling students to modify course materials and structure without the required privileges."}, {'type': 'paragraph', 'content': 'The vulnerability can be exploited by a student who authenticates, identifies a course unit, and sends a specially crafted POST request to add content.'}] [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized users (students) to modify course content, potentially leading to misinformation, disruption of course structure, or unauthorized changes that could affect the integrity of educational materials.
Since the integrity of course content is compromised, it may undermine trust in the platform and cause administrative overhead to detect and correct unauthorized changes.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated students to add content to existing course units, which is normally restricted to higher-privileged roles. This improper access control could lead to unauthorized modification of course materials and structure.
While the CVE description and resources do not explicitly mention compliance with standards such as GDPR or HIPAA, the unauthorized modification of course content could potentially impact data integrity requirements under such regulations.
However, there is no direct information provided about how this vulnerability affects compliance with these regulations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by verifying if authenticated users with the student role are able to send POST requests to the /modules/units/insert.php endpoint to add content to existing course units, which should normally be restricted.'}, {'type': 'paragraph', 'content': 'A practical detection method involves authenticating as a student user and attempting to add content via a POST request to the affected endpoint. If the request succeeds, the system is vulnerable.'}, {'type': 'paragraph', 'content': 'Example command using curl to test the vulnerability:'}, {'type': 'list_item', 'content': 'curl -X POST -b "cookie=student_session_cookie" -d "unit_id=COURSE_UNIT_ID&content=TEST_CONTENT" https://your-openeclass-domain/modules/units/insert.php'}, {'type': 'paragraph', 'content': 'Replace "student_session_cookie" with a valid authenticated session cookie for a student user, "COURSE_UNIT_ID" with an existing course unit identifier, and "TEST_CONTENT" with the content you want to attempt to add.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade the Open eClass platform to version 4.2 or later, where this broken access control vulnerability has been patched.
Until the upgrade can be performed, restrict access to the /modules/units/insert.php endpoint to only authorized roles (instructors or administrators) by implementing additional access control measures at the web server or application level.
Additionally, monitor and audit logs for any unauthorized POST requests to the affected endpoint from student accounts.