GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.
History

Tue, 03 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.
Title GUnet OpenEclass 1.7.3 E-learning platform - File Upload Extension Bypass
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-03T16:52:45.772Z

Reserved: 2026-02-03T16:27:45.302Z

Link: CVE-2020-37113

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-03T18:16:11.527

Modified: 2026-02-03T18:16:11.527

Link: CVE-2020-37113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.