Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50191: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in chamilo chamilo-lms

0
High
VulnerabilityCVE-2025-50191cvecve-2025-50191cwe-89
Published: Mon Mar 02 2026 (03/02/2026, 14:53:36 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Prior to version 1.11.30, there is an error-based SQL Injection via POST userFile with the /main/exercise/hotpotatoes.php script. This issue has been patched in version 1.11.30.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 17:21:46 UTC

Technical Analysis

Chamilo LMS, an open-source learning management system, contains a critical SQL Injection vulnerability identified as CVE-2025-50191. This vulnerability arises from improper neutralization of special characters in the 'userFile' POST parameter within the /main/exercise/hotpotatoes.php script. Specifically, the application fails to adequately sanitize or parameterize SQL queries constructed using this input, enabling an attacker to inject malicious SQL commands. The vulnerability is error-based, meaning attackers can infer database structure and content by analyzing error messages returned by the system. Exploitation requires the attacker to have high privileges (PR:H) but does not require authentication or user interaction, increasing the risk in environments where privileged access is compromised or misconfigured. The CVSS 4.0 score of 7 reflects a high severity due to network attack vector, low attack complexity, and significant impact on confidentiality, integrity, and availability of data. The vulnerability affects all Chamilo LMS versions prior to 1.11.30, with the vendor releasing a patch to address the issue. No public exploits have been reported yet, but the presence of this vulnerability in widely deployed LMS instances poses a substantial risk to educational institutions and organizations relying on Chamilo for e-learning.

Potential Impact

The SQL Injection vulnerability can lead to unauthorized disclosure, modification, or deletion of sensitive data stored in the Chamilo LMS database. Attackers exploiting this flaw could extract user credentials, course materials, personal information, or administrative data, compromising confidentiality. They could also alter or corrupt data, impacting integrity and potentially disrupting LMS availability. Given the role of Chamilo in managing educational content and user data, such breaches could undermine trust, violate privacy regulations, and cause operational disruptions. Since exploitation requires high privileges, the impact is particularly severe in environments where privileged accounts are accessible or compromised. The lack of user interaction requirement means automated attacks could be launched once access is obtained. Organizations worldwide using vulnerable versions face risks of data breaches, reputational damage, and compliance violations.

Mitigation Recommendations

Organizations should immediately upgrade Chamilo LMS installations to version 1.11.30 or later, where the vulnerability is patched. Until upgrades are possible, restrict access to the affected script (/main/exercise/hotpotatoes.php) through network controls or web application firewalls to limit exposure. Implement strict privilege management to minimize the number of users with high-level access capable of exploiting this flaw. Employ input validation and parameterized queries in custom code or plugins to prevent injection attacks. Monitor logs for unusual database errors or suspicious POST requests targeting the vulnerable parameter. Conduct regular security assessments and penetration testing focused on injection vulnerabilities. Additionally, consider deploying runtime application self-protection (RASP) solutions to detect and block injection attempts in real time. Maintain up-to-date backups to enable recovery in case of data compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-13T19:17:51.727Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a5a89032ffcdb8a23d2f3b

Added to database: 3/2/2026, 3:11:12 PM

Last enriched: 3/9/2026, 5:21:46 PM

Last updated: 4/16/2026, 1:48:14 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses