Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50189: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in chamilo chamilo-lms

0
High
VulnerabilityCVE-2025-50189cvecve-2025-50189cwe-89
Published: Mon Mar 02 2026 (03/02/2026, 14:49:09 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the POST resource[document][SQL_INJECTION_HERE] and POST login parameters found in /main/coursecopy/copy_course_session_selected.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.

AI-Powered Analysis

AILast updated: 03/02/2026, 15:26:26 UTC

Technical Analysis

CVE-2025-50189 is an SQL Injection vulnerability classified under CWE-89, discovered in the Chamilo Learning Management System (LMS) prior to version 1.11.30. The vulnerability exists due to insufficient sanitization and validation of user input received via POST parameters, specifically in the /main/coursecopy/copy_course_session_selected.php endpoint. Attackers can exploit this flaw by injecting malicious SQL statements into the 'document' and 'login' POST parameters, which are then incorporated into database queries without proper neutralization of special SQL elements. This allows attackers to alter the logic of SQL queries executed by the application, potentially leading to unauthorized data access, data modification, or other database manipulations. The vulnerability does not require user interaction and can be exploited remotely over the network without authentication, though it requires low privileges (PR:L). The CVSS 4.0 base score is 7.2, reflecting a high severity due to the potential impact on data confidentiality and integrity, and the ease of exploitation. The vulnerability has been addressed in Chamilo LMS version 1.11.30 by implementing proper input validation and query parameterization to prevent injection attacks. No known exploits have been reported in the wild as of the publication date. Given Chamilo's role as an LMS, exploitation could compromise sensitive educational data and user information.

Potential Impact

The impact of CVE-2025-50189 on organizations worldwide can be significant, especially for educational institutions and organizations relying on Chamilo LMS for course management and delivery. Successful exploitation can lead to unauthorized modification or disclosure of sensitive data stored in the LMS database, including user credentials, course materials, and personal information. This compromises data confidentiality and integrity, potentially leading to data breaches, loss of trust, and regulatory compliance violations (e.g., GDPR for EU organizations). Additionally, attackers could manipulate course data or user sessions, disrupting educational services and availability. Since the vulnerability can be exploited remotely without authentication, it increases the attack surface and risk of automated attacks or exploitation by malicious actors. Organizations using vulnerable versions of Chamilo LMS face risks of targeted attacks, data theft, and operational disruption until patched.

Mitigation Recommendations

To mitigate CVE-2025-50189, organizations should immediately upgrade Chamilo LMS to version 1.11.30 or later, where the vulnerability is patched. If immediate upgrade is not feasible, implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the affected endpoint (/main/coursecopy/copy_course_session_selected.php). Conduct thorough input validation and sanitization on all user-supplied data, especially POST parameters related to course copying and login functions. Employ parameterized queries or prepared statements in custom code interacting with the database. Restrict access to the vulnerable endpoint to trusted users or IP ranges where possible. Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. Educate developers and administrators about secure coding practices to prevent similar vulnerabilities. Regularly audit and test the LMS environment for injection flaws using automated scanning tools and manual penetration testing.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-13T19:17:51.727Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a5a89032ffcdb8a23d2f2f

Added to database: 3/2/2026, 3:11:12 PM

Last enriched: 3/2/2026, 3:26:26 PM

Last updated: 3/2/2026, 10:01:12 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses