Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gunet
Gunet open Eclass Platform |
|
| CPEs | cpe:2.3:a:gunet:open_eclass_platform:1.7.3:*:*:*:*:*:*:* | |
| Vendors & Products |
Gunet
Gunet open Eclass Platform |
Fri, 06 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openeclass
Openeclass openeclass |
|
| Vendors & Products |
Openeclass
Openeclass openeclass |
Tue, 03 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature. | |
| Title | GUnet OpenEclass 1.7.3 E-learning platform - File Upload Extension Bypass | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-06T19:30:43.252Z
Reserved: 2026-02-03T16:27:45.302Z
Link: CVE-2020-37113
Updated: 2026-02-06T19:29:51.583Z
Status : Analyzed
Published: 2026-02-03T18:16:11.527
Modified: 2026-02-12T18:33:09.553
Link: CVE-2020-37113
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:09:37Z