An issue in the jmpath variable in /modules/mindmap/index.php of GUnet Open eClass Platform (aka openeclass) v3.12.4 and below allows attackers to read arbitrary files via a directory traversal.
https://www.openeclass.org/en/
https://hg.gunet.gr/openeclass/diff/cbfc90094d51/modules/mindmap/index.php
https://github.com/gunet/openeclass
https://emaragkos.gr/gunet-open-eclass-authenticated-path-traversal/