← Back to CVEs
CVE-2020-37113
HIGH8.8
Description
GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when uploading files. By renaming a PHP file to .php3 or .PhP, an attacker can upload a web shell and execute arbitrary code on the server. This vulnerability enables remote code execution by bypassing the intended file type checks in the exercise submission feature.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/3/2026
Last Modified2/12/2026
Sourcenvd
Honeypot Sightings0
Affected Products
gunet:open_eclass_platform
Weaknesses (CWE)
CWE-434
References
https://download.openeclass.org/files/docs/1.7/CHANGES.txt(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/48163(disclosure@vulncheck.com)
https://www.openeclass.org/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/gunet-openeclass-e-learning-platform-file-upload-extension-bypass(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.