← Back to CVEs
CVE-2025-52468
HIGH8.8
Description
Chamilo is a learning management system. Prior to version 1.11.30, an input validation vulnerability exists when importing user data from CSV files. This flaw occurs due to insufficient sanitization of user data, specifically in the "Last Name", "First Name", and "Username" fields. It allows attackers to inject a stored cross-site scripting (XSS) payload that is triggered when the user profile is viewed, potentially leading to malicious script execution in the context of the authenticated use. This issue has been patched in version 1.11.30.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published3/2/2026
Last Modified3/3/2026
Sourcenvd
Honeypot Sightings0
Affected Products
chamilo:chamilo_lms
Weaknesses (CWE)
CWE-79
References
https://github.com/chamilo/chamilo-lms/commit/790ef513aceacae6fe5b6641145901f04c7992dd(security-advisories@github.com)
https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.30(security-advisories@github.com)
https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-hc3c-8p55-xh4r(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.