Home

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue.

PUBLISHED Reserved 2026-01-07 | Published 2026-01-08 | Updated 2026-01-23 | Assigner GitHub_M




HIGH: 7.3CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-434: Unrestricted Upload of File with Dangerous Type

Product status

< 4.2
affected

References

github.com/...eclass/security/advisories/GHSA-rf6j-xgqp-wjxg exploit

github.com/...eclass/security/advisories/GHSA-gq72-7mwg-424r

twelvesec.com/...e-via-arbitrary-file-upload-at-open-eclass/

github.com/...eclass/security/advisories/GHSA-rf6j-xgqp-wjxg

github.com/...eclass/security/advisories/GHSA-gq72-7mwg-424r

github.com/...ommit/3f9d267b79812a4dd708bb1302339e6a5abe67d9

cve.org (CVE-2026-22241)

nvd.nist.gov (CVE-2026-22241)

Download JSON