CVE-2025-55289: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in chamilo chamilo-lms
Chamilo is a learning management system. Prior to version 1.11.34, there is a stored XSS vulnerability in Chamilo LMS (Verison 1.11.32) allows an attacker to inject arbitrary JavaScript into the platform’s social network and internal messaging features. When viewed by an authenticated user (including administrators), the payload executes in their browser within the LMS context. This enables full account takeover via session hijacking, unauthorized actions with the victim’s privileges, exfiltration of sensitive data, and potential self-propagation to other users. This issue has been patched in version 1.11.34.
AI Analysis
Technical Summary
Chamilo LMS, a widely used open-source learning management system, suffers from a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-55289. This vulnerability exists in versions prior to 1.11.34, notably version 1.11.32, within the social network and internal messaging components of the platform. The root cause is improper neutralization of user-supplied input during web page generation, classified under CWE-79. An attacker with at least limited privileges can inject arbitrary JavaScript code into these features, which is then stored persistently on the server. When an authenticated user, including administrators, accesses the affected pages, the malicious script executes in their browser under the LMS domain context. This execution allows the attacker to hijack user sessions, perform unauthorized actions with the victim’s privileges, exfiltrate sensitive data, and potentially propagate the attack to other users by injecting further payloads. The vulnerability does not require user interaction beyond viewing the malicious content, and no additional authentication bypass is needed beyond the initial injection capability. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction requirement. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to organizations relying on Chamilo LMS for educational and training purposes. The vendor has addressed the issue in version 1.11.34, and users are strongly advised to upgrade to this or later versions to remediate the vulnerability.
Potential Impact
The impact of CVE-2025-55289 is substantial for organizations using vulnerable versions of Chamilo LMS. Successful exploitation can lead to full account takeover of any authenticated user, including administrators, resulting in unauthorized access to sensitive educational data, user information, and potentially confidential organizational content. Attackers can manipulate LMS functionalities, disrupt learning activities, and compromise the integrity of training materials. The ability to exfiltrate data and perform actions with elevated privileges increases the risk of data breaches and operational disruption. Additionally, the stored nature of the XSS allows the attack to persist and spread among users, magnifying the potential damage. Educational institutions, corporate training departments, and any entities relying on Chamilo LMS for critical learning infrastructure face risks to confidentiality, integrity, and availability. The vulnerability could also be leveraged for broader network pivoting if attackers gain administrative control. Given the widespread use of Chamilo in various countries, the threat has a global reach, particularly affecting regions with significant adoption of open-source LMS platforms.
Mitigation Recommendations
To mitigate CVE-2025-55289, organizations should immediately upgrade Chamilo LMS to version 1.11.34 or later, where the vulnerability has been patched. Beyond patching, administrators should audit and sanitize all user-generated content in social network and messaging features to remove any potentially malicious scripts that may have been injected prior to the update. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the LMS domain. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting Chamilo LMS. Conduct regular security training for LMS administrators and users to recognize suspicious content and report anomalies. Review and tighten user privilege assignments to minimize the number of users who can post content that is rendered without proper sanitization. Finally, implement robust session management controls, such as secure cookies and session expiration, to reduce the impact of session hijacking attempts.
Affected Countries
United States, Brazil, France, Spain, Germany, Argentina, Colombia, Mexico, Italy, Portugal
CVE-2025-55289: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in chamilo chamilo-lms
Description
Chamilo is a learning management system. Prior to version 1.11.34, there is a stored XSS vulnerability in Chamilo LMS (Verison 1.11.32) allows an attacker to inject arbitrary JavaScript into the platform’s social network and internal messaging features. When viewed by an authenticated user (including administrators), the payload executes in their browser within the LMS context. This enables full account takeover via session hijacking, unauthorized actions with the victim’s privileges, exfiltration of sensitive data, and potential self-propagation to other users. This issue has been patched in version 1.11.34.
AI-Powered Analysis
Technical Analysis
Chamilo LMS, a widely used open-source learning management system, suffers from a stored Cross-Site Scripting (XSS) vulnerability identified as CVE-2025-55289. This vulnerability exists in versions prior to 1.11.34, notably version 1.11.32, within the social network and internal messaging components of the platform. The root cause is improper neutralization of user-supplied input during web page generation, classified under CWE-79. An attacker with at least limited privileges can inject arbitrary JavaScript code into these features, which is then stored persistently on the server. When an authenticated user, including administrators, accesses the affected pages, the malicious script executes in their browser under the LMS domain context. This execution allows the attacker to hijack user sessions, perform unauthorized actions with the victim’s privileges, exfiltrate sensitive data, and potentially propagate the attack to other users by injecting further payloads. The vulnerability does not require user interaction beyond viewing the malicious content, and no additional authentication bypass is needed beyond the initial injection capability. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction requirement. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to organizations relying on Chamilo LMS for educational and training purposes. The vendor has addressed the issue in version 1.11.34, and users are strongly advised to upgrade to this or later versions to remediate the vulnerability.
Potential Impact
The impact of CVE-2025-55289 is substantial for organizations using vulnerable versions of Chamilo LMS. Successful exploitation can lead to full account takeover of any authenticated user, including administrators, resulting in unauthorized access to sensitive educational data, user information, and potentially confidential organizational content. Attackers can manipulate LMS functionalities, disrupt learning activities, and compromise the integrity of training materials. The ability to exfiltrate data and perform actions with elevated privileges increases the risk of data breaches and operational disruption. Additionally, the stored nature of the XSS allows the attack to persist and spread among users, magnifying the potential damage. Educational institutions, corporate training departments, and any entities relying on Chamilo LMS for critical learning infrastructure face risks to confidentiality, integrity, and availability. The vulnerability could also be leveraged for broader network pivoting if attackers gain administrative control. Given the widespread use of Chamilo in various countries, the threat has a global reach, particularly affecting regions with significant adoption of open-source LMS platforms.
Mitigation Recommendations
To mitigate CVE-2025-55289, organizations should immediately upgrade Chamilo LMS to version 1.11.34 or later, where the vulnerability has been patched. Beyond patching, administrators should audit and sanitize all user-generated content in social network and messaging features to remove any potentially malicious scripts that may have been injected prior to the update. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the LMS domain. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting Chamilo LMS. Conduct regular security training for LMS administrators and users to recognize suspicious content and report anomalies. Review and tighten user privilege assignments to minimize the number of users who can post content that is rendered without proper sanitization. Finally, implement robust session management controls, such as secure cookies and session expiration, to reduce the impact of session hijacking attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-08-12T16:15:30.237Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69aa5508c48b3f10fff1d3b7
Added to database: 3/6/2026, 4:16:08 AM
Last enriched: 3/6/2026, 4:31:15 AM
Last updated: 3/7/2026, 4:20:55 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.