CVE-2025-50199: CWE-918: Server-Side Request Forgery (SSRF) in chamilo chamilo-lms
Chamilo is a learning management system. Prior to version 1.11.30, there is a blind SSRF vulnerability in /index.php via the POST openid_url parameter. This issue has been patched in version 1.11.30.
AI Analysis
Technical Summary
Chamilo LMS, an open-source learning management system, contains a critical SSRF vulnerability identified as CVE-2025-50199 (CWE-918) in versions prior to 1.11.30. The flaw resides in the /index.php script, specifically in the handling of the POST parameter openid_url. An attacker can supply a crafted URL in this parameter, causing the server to perform HTTP requests to arbitrary destinations. Because this is a blind SSRF, the attacker does not receive direct response data but can infer success through side channels or subsequent behavior. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The SSRF can be leveraged to access internal resources behind firewalls, potentially exposing sensitive data or enabling further attacks such as internal port scanning, exploitation of internal services, or pivoting within the network. The vulnerability has been assigned a CVSS 4.0 score of 7.7, reflecting high severity due to its network attack vector, lack of required privileges, and potential impact on confidentiality and integrity. Chamilo LMS version 1.11.30 includes a patch that properly validates or restricts the openid_url parameter to prevent SSRF. No public exploits have been reported yet, but the widespread use of Chamilo in educational institutions and organizations makes timely patching critical.
Potential Impact
The SSRF vulnerability in Chamilo LMS can have significant impacts on organizations worldwide, especially those using vulnerable versions in production environments. Exploitation can allow attackers to bypass network perimeter defenses by making the server initiate requests to internal systems, potentially exposing sensitive internal services, databases, or administrative interfaces. This can lead to data breaches, unauthorized access, or lateral movement within the network. Educational institutions and enterprises relying on Chamilo for e-learning may face disruption of services, loss of confidentiality of student or staff data, and reputational damage. Additionally, SSRF can be a stepping stone for more complex attacks, including server compromise or supply chain attacks if internal infrastructure is accessed. The fact that no authentication or user interaction is required increases the risk of automated exploitation attempts. Although no known exploits are currently reported, the high CVSS score and ease of exploitation make this a critical risk that should be addressed promptly.
Mitigation Recommendations
Organizations should immediately upgrade Chamilo LMS installations to version 1.11.30 or later, where the SSRF vulnerability is patched. If upgrading is not immediately feasible, administrators should implement strict input validation and sanitization on the openid_url parameter to restrict it to trusted domains or disable the affected functionality if possible. Network-level mitigations include implementing egress filtering to prevent the LMS server from making unauthorized outbound requests to internal or sensitive IP ranges. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF payloads targeting openid_url can provide temporary protection. Regularly monitor logs for unusual outbound requests originating from the LMS server. Conduct internal network segmentation to limit the impact of SSRF exploitation and restrict access to critical internal services. Finally, maintain an up-to-date inventory of Chamilo LMS deployments and ensure patch management processes are robust to quickly address future vulnerabilities.
Affected Countries
United States, France, Brazil, Germany, Spain, United Kingdom, Canada, Australia, India, Mexico
CVE-2025-50199: CWE-918: Server-Side Request Forgery (SSRF) in chamilo chamilo-lms
Description
Chamilo is a learning management system. Prior to version 1.11.30, there is a blind SSRF vulnerability in /index.php via the POST openid_url parameter. This issue has been patched in version 1.11.30.
AI-Powered Analysis
Technical Analysis
Chamilo LMS, an open-source learning management system, contains a critical SSRF vulnerability identified as CVE-2025-50199 (CWE-918) in versions prior to 1.11.30. The flaw resides in the /index.php script, specifically in the handling of the POST parameter openid_url. An attacker can supply a crafted URL in this parameter, causing the server to perform HTTP requests to arbitrary destinations. Because this is a blind SSRF, the attacker does not receive direct response data but can infer success through side channels or subsequent behavior. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The SSRF can be leveraged to access internal resources behind firewalls, potentially exposing sensitive data or enabling further attacks such as internal port scanning, exploitation of internal services, or pivoting within the network. The vulnerability has been assigned a CVSS 4.0 score of 7.7, reflecting high severity due to its network attack vector, lack of required privileges, and potential impact on confidentiality and integrity. Chamilo LMS version 1.11.30 includes a patch that properly validates or restricts the openid_url parameter to prevent SSRF. No public exploits have been reported yet, but the widespread use of Chamilo in educational institutions and organizations makes timely patching critical.
Potential Impact
The SSRF vulnerability in Chamilo LMS can have significant impacts on organizations worldwide, especially those using vulnerable versions in production environments. Exploitation can allow attackers to bypass network perimeter defenses by making the server initiate requests to internal systems, potentially exposing sensitive internal services, databases, or administrative interfaces. This can lead to data breaches, unauthorized access, or lateral movement within the network. Educational institutions and enterprises relying on Chamilo for e-learning may face disruption of services, loss of confidentiality of student or staff data, and reputational damage. Additionally, SSRF can be a stepping stone for more complex attacks, including server compromise or supply chain attacks if internal infrastructure is accessed. The fact that no authentication or user interaction is required increases the risk of automated exploitation attempts. Although no known exploits are currently reported, the high CVSS score and ease of exploitation make this a critical risk that should be addressed promptly.
Mitigation Recommendations
Organizations should immediately upgrade Chamilo LMS installations to version 1.11.30 or later, where the SSRF vulnerability is patched. If upgrading is not immediately feasible, administrators should implement strict input validation and sanitization on the openid_url parameter to restrict it to trusted domains or disable the affected functionality if possible. Network-level mitigations include implementing egress filtering to prevent the LMS server from making unauthorized outbound requests to internal or sensitive IP ranges. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF payloads targeting openid_url can provide temporary protection. Regularly monitor logs for unusual outbound requests originating from the LMS server. Conduct internal network segmentation to limit the impact of SSRF exploitation and restrict access to critical internal services. Finally, maintain an up-to-date inventory of Chamilo LMS deployments and ensure patch management processes are robust to quickly address future vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-13T19:17:51.728Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a5b69f32ffcdb8a2520647
Added to database: 3/2/2026, 4:11:11 PM
Last enriched: 3/2/2026, 4:26:13 PM
Last updated: 3/2/2026, 9:56:37 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3338: CWE-347 (Improper Verification of Cryptographic Signature) in AWS AWS-LC
HighCVE-2026-3337: CWE-208 (Observable Timing Discrepancy) in AWS AWS-LC
MediumCVE-2026-3336: CWE-295 (Improper Certificate Validation) in AWS AWS-LC
HighCVE-2026-2256: CWE-94 Improper Control of Generation of Code ('Code Injection') in ModelScope ms-agent
UnknownCVE-2026-26713: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.