Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50337: CWE-918: Server-Side Request Forgery (SSRF) in chamilo chamilo-lms

0
Medium
VulnerabilityCVE-2024-50337cvecve-2024-50337cwe-918
Published: Mon Mar 02 2026 (03/02/2026, 14:26:45 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Prior to version 1.11.28, the OpenId function allows anyone to send requests to any URL on server's behalf, which results in unauthenticated blind SSRF. This issue has been patched in version 1.11.28.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 17:19:05 UTC

Technical Analysis

Chamilo LMS, an open-source learning management system, was found to have a Server-Side Request Forgery (SSRF) vulnerability identified as CVE-2024-50337, affecting versions prior to 1.11.28. The vulnerability resides in the OpenId authentication function, which improperly handles URL requests, allowing unauthenticated attackers to coerce the server into sending HTTP requests to arbitrary URLs. This SSRF flaw enables attackers to potentially access internal services that are otherwise inaccessible externally, perform reconnaissance on internal network infrastructure, or interact with external systems under the guise of the vulnerable server. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely. The CVSS 3.1 base score of 5.3 reflects a medium severity, with the main impact being limited confidentiality exposure due to the ability to retrieve data from internal services. There is no direct impact on data integrity or service availability. The vulnerability was publicly disclosed and patched in Chamilo LMS version 1.11.28. No known exploits have been reported in the wild to date, but the nature of SSRF vulnerabilities means they can be leveraged for further attacks such as internal network scanning or pivoting. The patch involves proper validation and sanitization of URLs in the OpenId function to prevent arbitrary request redirection.

Potential Impact

The primary impact of CVE-2024-50337 is unauthorized internal network reconnaissance and potential data exposure from internal or protected resources accessible by the vulnerable Chamilo LMS server. Attackers can exploit this SSRF to bypass firewall rules and access internal services that are not exposed externally, potentially revealing sensitive information. While the vulnerability does not directly allow data modification or denial of service, it can be a stepping stone for more advanced attacks such as exploiting other internal vulnerabilities or exfiltrating sensitive data. Educational institutions and organizations relying on Chamilo LMS may face risks of information leakage or network mapping by attackers. The ease of exploitation without authentication increases the threat level, especially in environments where the LMS server has privileged network access. However, the lack of known active exploitation and limited impact on integrity and availability somewhat reduces the immediate risk severity.

Mitigation Recommendations

Organizations using Chamilo LMS should immediately upgrade to version 1.11.28 or later, where the SSRF vulnerability has been patched. In addition to patching, administrators should implement network-level controls to restrict outbound HTTP/HTTPS requests from the LMS server to only trusted destinations, minimizing the risk of SSRF exploitation. Web application firewalls (WAFs) can be configured to detect and block suspicious SSRF patterns, such as requests to internal IP ranges or unusual URL parameters. Monitoring and logging outbound requests from the LMS server can help detect exploitation attempts. If upgrading is not immediately possible, disabling the OpenId function temporarily or restricting its usage can reduce exposure. Regular security assessments and penetration testing focusing on SSRF and related vulnerabilities should be conducted to identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-10-22T17:54:40.954Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5a50b32ffcdb8a23b6e44

Added to database: 3/2/2026, 2:56:11 PM

Last enriched: 3/9/2026, 5:19:05 PM

Last updated: 4/16/2026, 7:36:48 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses