Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50199: CWE-918: Server-Side Request Forgery (SSRF) in chamilo chamilo-lms

0
High
VulnerabilityCVE-2025-50199cvecve-2025-50199cwe-918
Published: Mon Mar 02 2026 (03/02/2026, 15:50:45 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Prior to version 1.11.30, there is a blind SSRF vulnerability in /index.php via the POST openid_url parameter. This issue has been patched in version 1.11.30.

AI-Powered Analysis

AILast updated: 03/02/2026, 16:26:13 UTC

Technical Analysis

Chamilo LMS, an open-source learning management system, contains a critical SSRF vulnerability identified as CVE-2025-50199 (CWE-918) in versions prior to 1.11.30. The flaw resides in the /index.php script, specifically in the handling of the POST parameter openid_url. An attacker can supply a crafted URL in this parameter, causing the server to perform HTTP requests to arbitrary destinations. Because this is a blind SSRF, the attacker does not receive direct response data but can infer success through side channels or subsequent behavior. The vulnerability requires no authentication or user interaction, making it remotely exploitable over the network. The SSRF can be leveraged to access internal resources behind firewalls, potentially exposing sensitive data or enabling further attacks such as internal port scanning, exploitation of internal services, or pivoting within the network. The vulnerability has been assigned a CVSS 4.0 score of 7.7, reflecting high severity due to its network attack vector, lack of required privileges, and potential impact on confidentiality and integrity. Chamilo LMS version 1.11.30 includes a patch that properly validates or restricts the openid_url parameter to prevent SSRF. No public exploits have been reported yet, but the widespread use of Chamilo in educational institutions and organizations makes timely patching critical.

Potential Impact

The SSRF vulnerability in Chamilo LMS can have significant impacts on organizations worldwide, especially those using vulnerable versions in production environments. Exploitation can allow attackers to bypass network perimeter defenses by making the server initiate requests to internal systems, potentially exposing sensitive internal services, databases, or administrative interfaces. This can lead to data breaches, unauthorized access, or lateral movement within the network. Educational institutions and enterprises relying on Chamilo for e-learning may face disruption of services, loss of confidentiality of student or staff data, and reputational damage. Additionally, SSRF can be a stepping stone for more complex attacks, including server compromise or supply chain attacks if internal infrastructure is accessed. The fact that no authentication or user interaction is required increases the risk of automated exploitation attempts. Although no known exploits are currently reported, the high CVSS score and ease of exploitation make this a critical risk that should be addressed promptly.

Mitigation Recommendations

Organizations should immediately upgrade Chamilo LMS installations to version 1.11.30 or later, where the SSRF vulnerability is patched. If upgrading is not immediately feasible, administrators should implement strict input validation and sanitization on the openid_url parameter to restrict it to trusted domains or disable the affected functionality if possible. Network-level mitigations include implementing egress filtering to prevent the LMS server from making unauthorized outbound requests to internal or sensitive IP ranges. Deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SSRF payloads targeting openid_url can provide temporary protection. Regularly monitor logs for unusual outbound requests originating from the LMS server. Conduct internal network segmentation to limit the impact of SSRF exploitation and restrict access to critical internal services. Finally, maintain an up-to-date inventory of Chamilo LMS deployments and ensure patch management processes are robust to quickly address future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-13T19:17:51.728Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a5b69f32ffcdb8a2520647

Added to database: 3/2/2026, 4:11:11 PM

Last enriched: 3/2/2026, 4:26:13 PM

Last updated: 3/2/2026, 9:56:37 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses