Unrated severityOSV Advisory· Published Jan 8, 2026· Updated Jan 23, 2026
Open eClass has Unrestricted File Upload that Leads to Remote Code Execution (RCE)
CVE-2026-22241
Description
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue.
Affected products
1- Range: Release_3.0, Release_3.2, Release_4.1.1, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/gunet/openeclass/commit/3f9d267b79812a4dd708bb1302339e6a5abe67d9mitrex_refsource_MISC
- github.com/gunet/openeclass/security/advisories/GHSA-gq72-7mwg-424rmitrex_refsource_MISC
- github.com/gunet/openeclass/security/advisories/GHSA-rf6j-xgqp-wjxgmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.