Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47886: CWE-502: Deserialization of Untrusted Data in chamilo chamilo-lms

0
High
VulnerabilityCVE-2024-47886cvecve-2024-47886cwe-502
Published: Mon Mar 02 2026 (03/02/2026, 14:23:50 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Chamillo is affected by a post-authentication phar unserialize which leads to a remote code execution (RCE) within versions 1.11.12 to 1.11.26. By abusing multiple supported features from the virtualization plugin vchamilo, the vulnerability allows an administrator to execute arbitrary code on the server. This issue has been patched in version 1.11.26.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 17:18:48 UTC

Technical Analysis

Chamilo LMS, a popular open-source learning management system, is affected by a critical deserialization vulnerability identified as CVE-2024-47886 (CWE-502). This vulnerability exists in versions 1.11.12 up to but not including 1.11.28. It involves unsafe deserialization of PHP phar archives within the virtualization plugin named vchamilo. The flaw allows an authenticated administrator user to supply crafted serialized data that, when unserialized by the system, leads to remote code execution (RCE) on the underlying server. This occurs because the plugin improperly handles phar deserialization, enabling execution of arbitrary PHP objects and code. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The issue has been addressed in Chamilo LMS version 1.11.28 by correcting the deserialization process to safely handle untrusted data. The CVSS 4.0 base score is 8.7, reflecting high severity due to network attack vector, no required privileges or user interaction beyond admin authentication, and high impact on confidentiality and integrity. No public exploits or active exploitation campaigns have been reported yet, but the vulnerability poses a significant risk to organizations using affected versions of Chamilo LMS, especially those exposing the LMS to external networks.

Potential Impact

Successful exploitation of CVE-2024-47886 allows an attacker with administrator access to execute arbitrary code on the server hosting Chamilo LMS. This can lead to full system compromise, including data theft, manipulation of educational content, disruption of LMS services, and potential lateral movement within the network. Given Chamilo's role in managing sensitive educational data and user information, this vulnerability threatens confidentiality, integrity, and availability of critical learning infrastructure. Organizations relying on Chamilo LMS for remote education or training could face operational downtime, reputational damage, and regulatory compliance issues if exploited. The vulnerability's exploitation does not require additional user interaction beyond admin authentication, increasing the risk if admin credentials are compromised or weak. Although no known exploits are currently in the wild, the high severity and ease of exploitation make timely patching essential to prevent future attacks.

Mitigation Recommendations

1. Immediately upgrade Chamilo LMS installations to version 1.11.28 or later, where the vulnerability is patched. 2. Restrict administrative access to the LMS to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce risk of credential compromise. 3. Disable or remove the virtualization plugin vchamilo if it is not essential to your LMS deployment to reduce the attack surface. 4. Monitor LMS server logs for unusual activity related to phar file uploads or deserialization attempts. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious serialized payloads targeting the LMS. 6. Conduct regular security audits and vulnerability scans on LMS infrastructure to identify and remediate similar deserialization or code execution risks. 7. Isolate the LMS server within a segmented network zone to limit potential lateral movement in case of compromise. 8. Educate administrators on phishing and credential security best practices to prevent unauthorized access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-10-04T16:00:09.631Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a5c4fdb6c0d8506fa86d51

Added to database: 3/2/2026, 5:12:29 PM

Last enriched: 3/9/2026, 5:18:48 PM

Last updated: 4/16/2026, 8:48:23 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses