Home

Description

GUnet OpenEclass 1.7.3 contains multiple SQL injection vulnerabilities that allow authenticated attackers to manipulate database queries through unvalidated parameters. Attackers can exploit the 'month' parameter in the agenda module and other endpoints to extract sensitive database information using error-based or time-based injection techniques.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-03 | Updated 2026-02-06 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

1.7.3
affected

Credits

emaragkos finder

References

www.exploit-db.com/exploits/48163 (ExploitDB-48163) exploit

www.openeclass.org/ (Official Vendor Homepage) product

download.openeclass.org/files/docs/1.7/CHANGES.txt (Changelog) patch

www.vulncheck.com/...e-learning-platform-month-sql-injection (VulnCheck Advisory: GUnet OpenEclass 1.7.3 E-learning platform - 'month' SQL Injection) third-party-advisory

cve.org (CVE-2020-37112)

nvd.nist.gov (CVE-2020-37112)

Download JSON