CVE-2026-24672
Unknown Unknown - Not Provided
Stored XSS in Open eClass User Profiles Allows Script Injection

Publication date: 2026-02-03

Last updated on: 2026-02-10

Assigner: GitHub, Inc.

Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated students to inject malicious JavaScript into user profile fields, which is executed when users with viewing privileges access affected application pages. This issue has been patched in version 4.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gunet open_eclass_platform to 4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The Stored Cross-Site Scripting (XSS) vulnerability in Open eClass allows attackers to execute malicious scripts in the context of other users, potentially leading to session cookie theft and unauthorized actions. This can result in unauthorized access to personal data and compromise of user accounts.

Such unauthorized access and potential data breaches can negatively impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal data and ensuring user privacy and security.

By allowing injection of malicious code into user profile fields, the vulnerability undermines the integrity and confidentiality of user data, which are key principles in these regulations.

The issue has been patched in version 4.2, so using the updated version mitigates these compliance risks.


Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-24672 is a Stored Cross-Site Scripting (XSS) vulnerability in the Open eClass platform versions up to 4.1. It occurs because the application does not properly sanitize or encode user input in user profile fields, specifically the first name and last name attributes.'}, {'type': 'paragraph', 'content': 'Authenticated students can inject malicious JavaScript code into these profile fields. When users with viewing privileges, such as teachers or administrators, access the affected profile pages, the malicious script executes in their browser.'}, {'type': 'paragraph', 'content': "This vulnerability is classified under CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It has been patched in Open eClass version 4.2."}] [1]


How can this vulnerability impact me? :

The vulnerability can lead to serious security impacts including theft of session cookies, unauthorized actions performed on behalf of the victim user, and compromise of user accounts.

Because the malicious script executes in the context of users with viewing privileges, attackers can potentially hijack sessions or perform actions with elevated permissions.

The CVSS v3.1 base score for this vulnerability is 7.3, indicating high severity with high confidentiality and integrity impacts, though no impact on availability.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to inject a JavaScript payload into the first name or last name fields of a user profile while logged in as an authenticated student. For example, injecting a payload such as `<img src=x onerror=alert(document.cookie)>` into these fields and then accessing the profile page with a user account that has viewing privileges (e.g., teacher or administrator) will trigger the script execution if the system is vulnerable.

There are no specific network or system commands provided to detect this vulnerability automatically. Detection involves manual testing of the user profile input fields for improper sanitization of JavaScript code.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Open eClass platform to version 4.2 or later, where this Stored Cross-Site Scripting vulnerability has been patched.

Until the upgrade can be performed, restrict authenticated student privileges to prevent them from modifying user profile fields, or implement input sanitization and validation on the server side to block malicious JavaScript code in profile fields.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart