CVE-2026-22241

7.2 HIGH
Published: January 08, 2026 Modified: January 23, 2026
View on NVD

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/gunet/openeclass/security/advisories/GHSA-gq72-7mwg-424r
Source: security-advisories@github.com
Exploit Third Party Advisory
https://github.com/gunet/openeclass/security/advisories/GHSA-rf6j-xgqp-wjxg
Source: security-advisories@github.com
Exploit Third Party Advisory
https://github.com/gunet/openeclass/security/advisories/GHSA-gq72-7mwg-424r
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://twelvesec.com/2026/01/16/rce-via-arbitrary-file-upload-at-open-eclass/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://github.com/gunet/openeclass/security/advisories/GHSA-rf6j-xgqp-wjxg
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit Third Party Advisory

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.2 / 10.0
EPSS (Exploit Probability)
0.2%
44th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

openeclass