Unrated severityNVD Advisory· Published Feb 3, 2026· Updated Feb 6, 2026
GUnet OpenEclass 1.7.3 E-learning platform - File Upload Extension Bypass
CVE-2020-37113
Description
GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.
Affected products
2- Range: =1.7.3
- Openeclass/GUnet OpenEclassv5Range: 1.7.3 (2007)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- download.openeclass.org/files/docs/1.7/CHANGES.txtmitrepatch
- www.exploit-db.com/exploits/48163mitreexploit
- www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-file-upload-extension-bypassmitrethird-party-advisory
- www.openeclass.orgmitreproduct
News mentions
0No linked articles in our index yet.