Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52476: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in chamilo chamilo-lms

0
Medium
VulnerabilityCVE-2025-52476cvecve-2025-52476cwe-79
Published: Mon Mar 02 2026 (03/02/2026, 15:49:32 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Prior to version 1.11.30, there is a reflected cross-site scripting (XSS) vulnerability due to improper sanitization of the keyword_active parameter in admin/user_list.php. This issue has been patched in version 1.11.30.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 17:18:19 UTC

Technical Analysis

Chamilo LMS, an open-source learning management system widely used in educational institutions, is affected by a reflected cross-site scripting (XSS) vulnerability identified as CVE-2025-52476. This vulnerability exists in versions prior to 1.11.30 due to improper neutralization of user-supplied input in the keyword_active parameter within the admin/user_list.php script. Specifically, the application fails to adequately sanitize this parameter before reflecting it in the web page output, allowing an attacker to inject malicious JavaScript code. When a victim user, typically an administrator or staff member with access to the admin interface, clicks on a crafted URL containing the malicious payload, the script executes in their browser context. This can lead to theft of session cookies, enabling account takeover, or execution of arbitrary actions with the victim’s privileges. The vulnerability requires no authentication to exploit but does require user interaction (clicking the malicious link). The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N) reflects network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity. The issue was patched in Chamilo LMS version 1.11.30, which properly sanitizes the input to prevent script injection. No public exploits have been reported yet, but the vulnerability poses a moderate risk given the sensitive nature of LMS environments and the potential for privilege escalation or data theft.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of user sessions and data within the Chamilo LMS environment. Successful exploitation can lead to session hijacking, allowing attackers to impersonate administrative users and potentially modify course content, user data, or system settings. This can disrupt educational operations, compromise student and staff information, and damage institutional reputation. Since the vulnerability is reflected XSS, it requires social engineering to lure users into clicking malicious links, but the lack of authentication requirement lowers the barrier for attackers. The availability impact is minimal as the vulnerability does not directly cause denial of service. However, indirect impacts such as administrative account compromise could lead to broader system misuse or downtime. Organizations relying on Chamilo LMS for critical educational delivery or data management face moderate risk, especially if they have not applied the patch or implemented compensating controls.

Mitigation Recommendations

1. Upgrade Chamilo LMS to version 1.11.30 or later immediately to apply the official patch that properly sanitizes the keyword_active parameter. 2. Implement strict input validation and output encoding on all user-supplied data, especially parameters reflected in web pages. 3. Deploy a Content Security Policy (CSP) to restrict execution of unauthorized scripts, mitigating the impact of potential XSS payloads. 4. Educate administrative users and staff about the risks of clicking unknown or suspicious links, reducing the likelihood of successful social engineering. 5. Monitor web server logs and application logs for unusual URL patterns or repeated attempts to exploit the keyword_active parameter. 6. Consider using web application firewalls (WAFs) with rules designed to detect and block reflected XSS attempts targeting Chamilo LMS. 7. Regularly audit and test the LMS environment for other potential input validation issues to proactively prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-17T02:28:39.717Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a5b69f32ffcdb8a252065f

Added to database: 3/2/2026, 4:11:11 PM

Last enriched: 3/9/2026, 5:18:19 PM

Last updated: 4/15/2026, 9:39:41 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses