CVE-2026-22241

Source
https://cve.org/CVERecord?id=CVE-2026-22241
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22241.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-22241
Related
  • GHSA-gq72-7mwg-424r
  • GHSA-rf6j-xgqp-wjxg
Published
2026-01-08T15:07:02.350Z
Modified
2026-03-14T12:47:35.302280Z
Severity
  • 7.3 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
Open eClass has Unrestricted File Upload that Leads to Remote Code Execution (RCE)
Details

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-434"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22241.json"
}
References

Affected packages

Git / github.com/gunet/openeclass

Affected ranges

Type
GIT
Repo
https://github.com/gunet/openeclass
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Release_3.*
Release_3.0
Release_3.1
Release_3.1.1
Release_3.1.2
Release_3.2
Release_4.*
Release_4.0
Release_4.0.1
Release_4.0.2
Release_4.1
Release_4.1.1
Release_4.1.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22241.json"