CVE-2020-37113

HIGH

GUnet OpenEclass 1.7.3 - Auth Bypass

Title source: llm
STIX 2.1

Description

GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.

Exploits (1)

exploitdb WRITEUP
by emaragkos · textwebappsphp
https://www.exploit-db.com/exploits/48163

Scores

CVSS v3 8.8
EPSS 0.0025
EPSS Percentile 47.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-434
Status published
Products (1)
gunet/open_eclass_platform 1.7.3
Published Feb 03, 2026
Tracked Since Feb 18, 2026