Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52469: CWE-841: Improper Enforcement of Behavioral Workflow in chamilo chamilo-lms

0
High
VulnerabilityCVE-2025-52469cvecve-2025-52469cwe-841
Published: Mon Mar 02 2026 (03/02/2026, 15:48:24 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Prior to version 1.11.30, a logic vulnerability in the friend request workflow of Chamilo’s social network module allows an authenticated user to forcibly add any user as a friend by directly calling the AJAX endpoint. The attacker can bypass the normal flow of sending and accepting friend requests, and even add non-existent users. This breaks access control and social interaction logic, with potential privacy implications. This issue has been patched in version 1.11.30.

AI-Powered Analysis

AILast updated: 03/02/2026, 16:25:49 UTC

Technical Analysis

Chamilo is an open-source learning management system widely used in educational institutions and organizations. The vulnerability identified as CVE-2025-52469 stems from improper enforcement of the behavioral workflow in the social network module's friend request feature. Specifically, prior to version 1.11.30, the system fails to properly validate the workflow steps when processing friend requests. An authenticated attacker can directly call the AJAX endpoint responsible for adding friends, bypassing the intended process of sending and accepting friend requests. This allows the attacker to forcibly add any user as a friend without their consent, including users that do not exist in the system. This flaw violates access control policies and undermines the integrity of social interactions within the platform. The vulnerability is classified under CWE-841 (Improper Enforcement of Behavioral Workflow). The CVSS v3.1 base score is 7.1, with vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N, indicating network attack vector, low attack complexity, requiring low privileges (authenticated user), no user interaction, unchanged scope, low confidentiality impact, high integrity impact, and no availability impact. Although no exploits have been reported in the wild, the vulnerability poses a significant risk to user privacy and trust in the platform. The vendor has addressed this issue in Chamilo LMS version 1.11.30 by enforcing proper workflow validation and access control checks on the friend request AJAX endpoint.

Potential Impact

The primary impact of this vulnerability is on the integrity of the social network module within Chamilo LMS. Attackers can manipulate friend relationships without user consent, potentially leading to unauthorized access to user-related social data or interactions that rely on friend relationships. This can erode user trust and privacy, as users may be unknowingly connected to malicious or unauthorized accounts. While confidentiality impact is rated low, the breach of social interaction logic can facilitate further social engineering or targeted attacks within the LMS environment. Since the vulnerability requires authentication, the attack surface is limited to registered users, but given that many LMS deployments have large user bases, the scope can be significant. There is no direct impact on system availability. Organizations relying on Chamilo LMS for educational or training purposes may face reputational damage and compliance risks if user privacy is compromised. The lack of user interaction requirement makes exploitation straightforward for authenticated users, increasing the likelihood of abuse if the system is not patched.

Mitigation Recommendations

Organizations should upgrade Chamilo LMS installations to version 1.11.30 or later, where the vulnerability has been patched. Until upgrade is possible, administrators can implement strict monitoring and logging of AJAX endpoint calls related to friend requests to detect anomalous behavior. Access controls should be reviewed to ensure only authorized users can invoke sensitive endpoints. Additionally, consider disabling or restricting the social network module if it is not essential to reduce the attack surface. User education on recognizing suspicious friend connections can help mitigate social engineering risks. Regularly auditing user relationships and cleaning up unauthorized friend links can limit the impact of exploitation. Finally, maintain up-to-date backups and incident response plans to quickly address any misuse stemming from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-17T02:28:39.716Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5b69f32ffcdb8a2520650

Added to database: 3/2/2026, 4:11:11 PM

Last enriched: 3/2/2026, 4:25:49 PM

Last updated: 3/2/2026, 9:41:51 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses