The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 09 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openeclass
Openeclass openeclass |
|
| Vendors & Products |
Openeclass
Openeclass openeclass |
Thu, 08 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue. | |
| Title | Open eClass has Unrestricted File Upload that Leads to Remote Code Execution (RCE) | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-08T15:07:02.350Z
Updated: 2026-01-08T15:54:41.821Z
Reserved: 2026-01-07T05:19:12.920Z
Link: CVE-2026-22241
Updated: 2026-01-08T15:50:35.288Z
Status : Awaiting Analysis
Published: 2026-01-08T15:15:45.720
Modified: 2026-01-08T18:08:18.457
Link: CVE-2026-22241
No data.