CVE-2025-52564: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in chamilo chamilo-lms
Chamilo is a learning management system. Prior to version 1.11.30, the open parameter of help.php fails to properly sanitize user input. This allows an attacker to inject arbitrary HTML, such as underlined text, via a crafted URL. This issue has been patched in version 1.11.30.
AI Analysis
Technical Summary
CVE-2025-52564 is a cross-site scripting (XSS) vulnerability classified under CWE-80 affecting the Chamilo learning management system (LMS) in versions prior to 1.11.30. The vulnerability stems from the 'open' parameter in the help.php script, which fails to properly neutralize or sanitize user-supplied input before rendering it in the web page. This improper input handling allows an attacker to inject arbitrary HTML tags, such as underlined text or potentially malicious scripts, by crafting a specially formed URL. The vulnerability is exploitable remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 6.9 (medium severity) reflects the moderate impact on confidentiality and integrity, with no direct impact on availability. Exploitation could lead to content spoofing, session hijacking, or redirection to malicious sites, undermining user trust and potentially exposing sensitive information. The issue was addressed and patched in Chamilo LMS version 1.11.30 by implementing proper input sanitization and output encoding to prevent injection of script-related HTML tags. No known exploits have been reported in the wild to date, but the vulnerability remains a concern for organizations running outdated versions of Chamilo LMS.
Potential Impact
The primary impact of CVE-2025-52564 is on the confidentiality and integrity of users interacting with vulnerable Chamilo LMS instances. Successful exploitation can allow attackers to inject arbitrary HTML content, potentially including malicious scripts, which can be used for phishing, session hijacking, or delivering malware. This undermines user trust and can lead to unauthorized access to user accounts or sensitive educational data. Since the vulnerability does not require authentication or user interaction, it can be exploited by remote attackers with minimal effort. Although availability is not directly affected, the reputational damage and potential data breaches can have significant operational and compliance consequences for educational institutions and organizations using Chamilo LMS. The scope is limited to Chamilo LMS deployments running versions prior to 1.11.30, but given the widespread use of Chamilo in education sectors worldwide, the potential impact is notable.
Mitigation Recommendations
Organizations should immediately upgrade Chamilo LMS to version 1.11.30 or later, where the vulnerability is patched. In addition to patching, implement strict input validation and output encoding on all user-supplied data, especially URL parameters like 'open' in help.php, to prevent injection of HTML or script tags. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Regularly audit and monitor web application logs for suspicious URL patterns that may indicate exploitation attempts. Educate users and administrators about the risks of clicking on untrusted links and encourage the use of security awareness training. Finally, consider deploying web application firewalls (WAFs) configured to detect and block XSS attack vectors targeting Chamilo LMS.
Affected Countries
United States, Brazil, France, Spain, Mexico, Argentina, Colombia, Portugal, Italy, Germany
CVE-2025-52564: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in chamilo chamilo-lms
Description
Chamilo is a learning management system. Prior to version 1.11.30, the open parameter of help.php fails to properly sanitize user input. This allows an attacker to inject arbitrary HTML, such as underlined text, via a crafted URL. This issue has been patched in version 1.11.30.
AI-Powered Analysis
Technical Analysis
CVE-2025-52564 is a cross-site scripting (XSS) vulnerability classified under CWE-80 affecting the Chamilo learning management system (LMS) in versions prior to 1.11.30. The vulnerability stems from the 'open' parameter in the help.php script, which fails to properly neutralize or sanitize user-supplied input before rendering it in the web page. This improper input handling allows an attacker to inject arbitrary HTML tags, such as underlined text or potentially malicious scripts, by crafting a specially formed URL. The vulnerability is exploitable remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS score of 6.9 (medium severity) reflects the moderate impact on confidentiality and integrity, with no direct impact on availability. Exploitation could lead to content spoofing, session hijacking, or redirection to malicious sites, undermining user trust and potentially exposing sensitive information. The issue was addressed and patched in Chamilo LMS version 1.11.30 by implementing proper input sanitization and output encoding to prevent injection of script-related HTML tags. No known exploits have been reported in the wild to date, but the vulnerability remains a concern for organizations running outdated versions of Chamilo LMS.
Potential Impact
The primary impact of CVE-2025-52564 is on the confidentiality and integrity of users interacting with vulnerable Chamilo LMS instances. Successful exploitation can allow attackers to inject arbitrary HTML content, potentially including malicious scripts, which can be used for phishing, session hijacking, or delivering malware. This undermines user trust and can lead to unauthorized access to user accounts or sensitive educational data. Since the vulnerability does not require authentication or user interaction, it can be exploited by remote attackers with minimal effort. Although availability is not directly affected, the reputational damage and potential data breaches can have significant operational and compliance consequences for educational institutions and organizations using Chamilo LMS. The scope is limited to Chamilo LMS deployments running versions prior to 1.11.30, but given the widespread use of Chamilo in education sectors worldwide, the potential impact is notable.
Mitigation Recommendations
Organizations should immediately upgrade Chamilo LMS to version 1.11.30 or later, where the vulnerability is patched. In addition to patching, implement strict input validation and output encoding on all user-supplied data, especially URL parameters like 'open' in help.php, to prevent injection of HTML or script tags. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Regularly audit and monitor web application logs for suspicious URL patterns that may indicate exploitation attempts. Educate users and administrators about the risks of clicking on untrusted links and encourage the use of security awareness training. Finally, consider deploying web application firewalls (WAFs) configured to detect and block XSS attack vectors targeting Chamilo LMS.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-18T03:55:52.035Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a5b69f32ffcdb8a2520668
Added to database: 3/2/2026, 4:11:11 PM
Last enriched: 3/2/2026, 4:26:55 PM
Last updated: 3/2/2026, 11:04:47 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2583: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy
MediumCVE-2026-3338: CWE-347 (Improper Verification of Cryptographic Signature) in AWS AWS-LC
HighCVE-2026-3337: CWE-208 (Observable Timing Discrepancy) in AWS AWS-LC
MediumCVE-2026-3336: CWE-295 (Improper Certificate Validation) in AWS AWS-LC
HighCVE-2026-2256: CWE-94 Improper Control of Generation of Code ('Code Injection') in ModelScope ms-agent
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.