← Voltar para CVEs
CVE-2025-50188
HIGH7.2
Descricao
Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the GET value parameter with the following scripts: /plugin/vchamilo/views/syncparams.php and /plugin/vchamilo/ajax/service.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.
Detalhes CVE
Pontuacao CVSS v3.17.2
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosHIGH
Interacao do usuarioNONE
Publicado3/2/2026
Ultima modificacao3/3/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
chamilo:chamilo_lms
Fraquezas (CWE)
CWE-89
Referencias
https://github.com/chamilo/chamilo-lms/commit/ef54cc0906a3caaa3e7ac9b640b044f03b1fe733(security-advisories@github.com)
https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.30(security-advisories@github.com)
https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-96j3-x45m-9q3r(security-advisories@github.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.