CVE-2026-24774
Unknown Unknown - Not Provided
Business Logic Flaw in Open eClass Allows Attendance Manipulation

Publication date: 2026-02-03

Last updated on: 2026-02-10

Assigner: GitHub, Inc.

Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, a business logic vulnerability allows authenticated students to improperly mark themselves as present in attendance activities, including activities that have already expired, by directly accessing a crafted URL. This issue has been patched in version 4.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gunet open_eclass_platform to 4.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-841 The product supports a session in which more than one behavior must be performed by an actor, but it does not properly ensure that the actor performs the behaviors in the required sequence.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-24774 is a business logic vulnerability in the Open eClass platform (versions up to 4.1) that allows authenticated students to fraudulently mark themselves as present in attendance activities, including those that have already expired.

The flaw exists because the attendance module fails to properly enforce authorization and state validation. A student can craft a special URL with parameters like course ID, attendance ID, and an incremental actId to mark attendance regardless of the activity’s actual status or prior attendance records.

This means students can manipulate attendance data, compromising the integrity of academic records. Exploitation requires only low privileges (student role) and no user interaction beyond accessing the crafted URL.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing students to fraudulently mark themselves as present in attendance activities, including those that have already expired.

Such manipulation compromises the integrity of academic records, potentially affecting attendance tracking, grading, and overall course management.

Since the attack requires only low privileges and minimal effort, it poses a moderate risk to the accuracy and trustworthiness of attendance data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unusual or unauthorized access to the attendance module URLs that include parameters such as course ID, attendance ID, and actId. Specifically, look for HTTP requests where authenticated student accounts access URLs similar to: http://<eclass_server>/modules/attendance/index.php?course=...&attendance_id=...&actId=...&qrCode_presence=true.'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts, you can analyze web server logs for such crafted URLs accessed by student roles, especially for attendance activities that are expired or should not be accessible.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect this activity include:'}, {'type': 'list_item', 'content': "Using grep on web server logs to find suspicious attendance URL access: grep -i 'modules/attendance/index.php' /var/log/apache2/access.log | grep -E 'attendance_id=[0-9]+'"}, {'type': 'list_item', 'content': "Filter logs for specific actId parameters that may indicate manipulation: grep 'actId=' /var/log/apache2/access.log"}, {'type': 'list_item', 'content': 'Correlate these log entries with user roles to identify if accessed by authenticated students.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade the Open eClass platform to version 4.2 or later, where this business logic vulnerability has been patched.

Until the upgrade can be applied, consider restricting access to the attendance module URLs to prevent students from manually crafting URLs to mark attendance.

Additionally, monitor and audit attendance records for suspicious entries that may indicate exploitation of this vulnerability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows authenticated students to fraudulently mark themselves as present in attendance activities, compromising the integrity of academic records. This manipulation of attendance data reflects a low integrity impact but does not directly affect confidentiality or availability.

There is no specific information provided about how this vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart