Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50188: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in chamilo chamilo-lms

0
High
VulnerabilityCVE-2025-50188cvecve-2025-50188cwe-89
Published: Mon Mar 02 2026 (03/02/2026, 14:47:03 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the GET value parameter with the following scripts: /plugin/vchamilo/views/syncparams.php and /plugin/vchamilo/ajax/service.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.

AI-Powered Analysis

AILast updated: 03/02/2026, 15:26:38 UTC

Technical Analysis

Chamilo LMS, an open-source learning management system, contains a critical SQL Injection vulnerability identified as CVE-2025-50188 (CWE-89). This vulnerability exists in versions prior to 1.11.30 due to improper neutralization of special elements in SQL commands. Specifically, the affected scripts /plugin/vchamilo/views/syncparams.php and /plugin/vchamilo/ajax/service.php fail to adequately validate or sanitize the GET parameter 'value'. This flaw allows an attacker with high privileges to manipulate the SQL query logic by injecting arbitrary SQL statements, potentially leading to unauthorized data access, modification, or deletion within the LMS database. The vulnerability does not require user interaction but does require the attacker to have elevated privileges, which may limit exploitation to insiders or compromised accounts. The issue has been addressed and patched in Chamilo LMS version 1.11.30. The CVSS v4.0 score is 7.0, reflecting high severity due to network attack vector, low attack complexity, no user interaction, and significant impact on confidentiality, integrity, and availability of data. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The vulnerability poses a significant risk to organizations using vulnerable Chamilo LMS versions, potentially exposing sensitive educational data, user credentials, and institutional records. Successful exploitation can lead to unauthorized data disclosure, data tampering, or complete compromise of the LMS database. This can disrupt educational services, damage organizational reputation, and lead to regulatory compliance issues, especially where personal data is involved. Since Chamilo LMS is widely used in educational institutions globally, the impact can be broad, affecting schools, universities, and training providers. The requirement for high privileges to exploit somewhat limits the attack surface but does not eliminate insider threats or risks from compromised administrative accounts. The absence of known exploits in the wild suggests limited active exploitation currently, but the availability of a public CVE and patch may increase attacker interest.

Mitigation Recommendations

Organizations should immediately upgrade Chamilo LMS installations to version 1.11.30 or later, where the vulnerability is patched. Until upgrades are possible, restrict access to the affected plugin scripts and monitor logs for suspicious GET requests targeting 'value' parameters. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns specific to Chamilo LMS plugin endpoints. Enforce the principle of least privilege by limiting administrative and plugin access rights to trusted users only. Conduct regular security audits and vulnerability scans focusing on web application inputs. Additionally, consider database activity monitoring to detect anomalous queries indicative of injection attempts. Educate administrators about the risks of SQL injection and the importance of timely patching. Finally, maintain up-to-date backups to enable recovery in case of data compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-13T19:17:51.727Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a5a89032ffcdb8a23d2f2a

Added to database: 3/2/2026, 3:11:12 PM

Last enriched: 3/2/2026, 3:26:38 PM

Last updated: 3/2/2026, 10:24:07 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses