Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50190: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in chamilo chamilo-lms

0
High
VulnerabilityCVE-2025-50190cvecve-2025-50190cwe-89
Published: Mon Mar 02 2026 (03/02/2026, 14:53:15 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Prior to version 1.11.30, there is an error-based SQL Injection via the GET openid.assoc_handle parameter with the /index.php script. This issue has been patched in version 1.11.30.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 17:19:32 UTC

Technical Analysis

CVE-2025-50190 is an SQL Injection vulnerability classified under CWE-89, affecting Chamilo LMS, an open-source learning management system widely used in educational and corporate training environments. The vulnerability arises from improper neutralization of special elements in SQL commands, specifically through the GET parameter openid.assoc_handle in the /index.php script. This error-based SQL Injection allows an unauthenticated attacker to inject malicious SQL queries directly into the backend database, potentially exposing sensitive data or altering database contents. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 4.0 score of 8.8 reflects the critical nature of the flaw, emphasizing its high impact on confidentiality and availability. The issue was addressed and patched in Chamilo LMS version 1.11.30, and users running earlier versions remain vulnerable. Although no active exploits have been reported in the wild, the simplicity of exploitation and the criticality of the LMS platform make this a significant threat. The vulnerability could be leveraged to extract user credentials, course data, or disrupt LMS operations, severely impacting educational institutions and organizations relying on Chamilo for training and learning management.

Potential Impact

The potential impact of CVE-2025-50190 is substantial for organizations worldwide using vulnerable versions of Chamilo LMS. Successful exploitation can lead to unauthorized disclosure of sensitive information such as user credentials, personal data, and proprietary course content, compromising confidentiality. Attackers could also manipulate or delete database records, affecting data integrity and availability of the LMS service. This disruption could halt critical educational and training activities, causing operational downtime and reputational damage. Given the LMS’s role in managing large user bases and sensitive academic or corporate data, the breach could have cascading effects on compliance with data protection regulations and contractual obligations. The vulnerability’s remote, unauthenticated nature increases the attack surface, allowing widespread exploitation attempts, especially in environments with exposed LMS web interfaces. Organizations without timely patching or compensating controls face elevated risk of data breaches and service interruptions.

Mitigation Recommendations

To mitigate CVE-2025-50190, organizations should immediately upgrade Chamilo LMS to version 1.11.30 or later, where the vulnerability is patched. If immediate upgrading is not feasible, implement web application firewall (WAF) rules to detect and block malicious SQL injection payloads targeting the openid.assoc_handle parameter. Restrict access to the LMS web interface by IP whitelisting or VPN to reduce exposure to untrusted networks. Conduct thorough logging and monitoring of database queries and web server access logs to detect anomalous activities indicative of SQL injection attempts. Employ input validation and parameterized queries in any custom integrations or plugins interacting with Chamilo LMS to prevent injection flaws. Regularly audit LMS deployments for outdated versions and apply security patches promptly. Educate system administrators and developers on secure coding practices and the risks of SQL injection vulnerabilities. Finally, maintain offline backups of LMS data to enable recovery in case of data corruption or deletion.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-13T19:17:51.727Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a5a89032ffcdb8a23d2f36

Added to database: 3/2/2026, 3:11:12 PM

Last enriched: 3/9/2026, 5:19:32 PM

Last updated: 4/15/2026, 11:55:33 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses