Skip to main content

CVE-2023-4225: CWE-434 Unrestricted Upload of File with Dangerous Type in Chamilo Chamilo

High
VulnerabilityCVE-2023-4225cvecve-2023-4225cwe-434
Published: Tue Nov 28 2023 (11/28/2023, 07:22:04 UTC)
Source: CVE Database V5
Vendor/Project: Chamilo
Product: Chamilo

Description

Unrestricted file upload in `/main/inc/ajax/exercise.ajax.php` in Chamilo LMS <= v1.11.24 allows authenticated attackers with learner role to obtain remote code execution via uploading of PHP files.

AI-Powered Analysis

AILast updated: 07/07/2025, 10:39:38 UTC

Technical Analysis

CVE-2023-4225 is a high-severity vulnerability affecting Chamilo LMS versions up to and including v1.11.24. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. Specifically, the issue exists in the file upload functionality located at `/main/inc/ajax/exercise.ajax.php`. Authenticated users with the learner role can exploit this flaw by uploading malicious PHP files without proper validation or restriction. This leads to remote code execution (RCE) on the server hosting the Chamilo LMS instance. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only requires privileges of a learner role (PR:L) without user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. Successful exploitation allows an attacker to execute arbitrary code remotely, potentially leading to full system compromise, data theft, or disruption of LMS services. No known public exploits have been reported yet, but the vulnerability is publicly disclosed and should be considered a critical risk for organizations using Chamilo LMS. Chamilo is an open-source learning management system widely used in educational institutions and corporate training environments, making this vulnerability particularly concerning for organizations relying on it for e-learning and training delivery.

Potential Impact

For European organizations, the impact of CVE-2023-4225 can be significant, especially for educational institutions, universities, and corporate training departments that utilize Chamilo LMS. Exploitation could lead to unauthorized access to sensitive educational data, including student records, assessments, and personal information, violating GDPR and other data protection regulations. Remote code execution could allow attackers to pivot within the network, potentially compromising other critical systems. The disruption of LMS services could affect the continuity of education and training programs, causing operational and reputational damage. Additionally, the breach of learner accounts could facilitate further social engineering or phishing attacks targeting staff and students. Given the increasing reliance on digital learning platforms in Europe, this vulnerability poses a substantial risk to confidentiality, integrity, and availability of educational services.

Mitigation Recommendations

To mitigate CVE-2023-4225, European organizations should: 1) Immediately upgrade Chamilo LMS to a version where this vulnerability is patched once available; if no patch is currently released, consider applying temporary mitigations such as disabling file upload functionality for learner roles or restricting upload directories to non-executable locations. 2) Implement strict input validation and file type restrictions on all file uploads, ensuring that executable file types like PHP are blocked. 3) Employ web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts targeting the vulnerable endpoint. 4) Conduct thorough access reviews to ensure that learner roles have minimal privileges and monitor for unusual activity related to file uploads. 5) Use network segmentation to isolate LMS servers from critical internal networks to limit lateral movement in case of compromise. 6) Monitor logs for any signs of exploitation attempts, such as unexpected PHP file uploads or execution. 7) Educate LMS administrators and security teams about this vulnerability and the importance of timely patching and monitoring. These steps go beyond generic advice by focusing on role-based restrictions, temporary disabling of risky features, and network-level protections tailored to Chamilo LMS deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
STAR_Labs
Date Reserved
2023-08-08T06:52:34.311Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6841a29c182aa0cae2e196c5

Added to database: 6/5/2025, 1:58:52 PM

Last enriched: 7/7/2025, 10:39:38 AM

Last updated: 7/28/2025, 8:27:06 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats