Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59544: CWE-862: Missing Authorization in chamilo chamilo-lms

0
Medium
VulnerabilityCVE-2025-59544cvecve-2025-59544cwe-862
Published: Fri Mar 06 2026 (03/06/2026, 03:32:20 UTC)
Source: CVE Database V5
Vendor/Project: chamilo
Product: chamilo-lms

Description

Chamilo is a learning management system. Prior to version 1.11.34, the functionality for the user to update the category does not implement authorization checks for the "category_id" parameter which allows users to update the category of any user by replacing the "category_id" parameter. This issue has been patched in version 1.11.34.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 19:44:49 UTC

Technical Analysis

Chamilo LMS, an open-source learning management system, prior to version 1.11.34, contains a vulnerability identified as CVE-2025-59544, classified under CWE-862 (Missing Authorization). The issue arises because the functionality that allows users to update the 'category_id' parameter does not enforce authorization checks. This means any authenticated or unauthenticated user can manipulate the 'category_id' parameter to change the category assignment of any user within the system. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects the integrity and confidentiality of user data by allowing unauthorized modifications to user categorizations, which could be leveraged for privilege escalation or to disrupt organizational user management policies. The vulnerability does not affect system availability. The flaw was addressed and patched in Chamilo LMS version 1.11.34. No known exploits have been reported in the wild to date, but the ease of exploitation and potential impact warrant prompt remediation. The vulnerability affects all Chamilo LMS installations running versions earlier than 1.11.34.

Potential Impact

The vulnerability allows unauthorized users to modify the category assignments of any user in the Chamilo LMS, potentially leading to unauthorized access to resources or data if category assignments correlate with permissions or access controls. This undermines the integrity of user data and could facilitate privilege escalation or unauthorized data exposure. Organizations relying on Chamilo LMS for educational or training purposes may experience disruption in user role management and trustworthiness of user categorizations. While the vulnerability does not directly impact system availability, the unauthorized changes could indirectly affect operational processes and compliance with data governance policies. The lack of authentication or user interaction required for exploitation increases the risk of automated or widespread attacks, especially in environments with publicly accessible Chamilo LMS instances.

Mitigation Recommendations

The primary mitigation is to upgrade Chamilo LMS to version 1.11.34 or later, where the authorization checks for the 'category_id' parameter have been implemented. Organizations should also audit current user category assignments to detect any unauthorized changes that may have occurred prior to patching. Implementing additional access control layers or monitoring mechanisms to log and alert on category changes can help detect exploitation attempts. Restricting network access to the LMS to trusted users and IP ranges can reduce exposure. Regularly reviewing and tightening user permissions and roles within the LMS will minimize the impact of unauthorized modifications. Finally, organizations should maintain an incident response plan to address any suspicious activity related to user management within the LMS.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-09-17T17:04:20.374Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa5508c48b3f10fff1d3cb

Added to database: 3/6/2026, 4:16:08 AM

Last enriched: 3/13/2026, 7:44:49 PM

Last updated: 4/19/2026, 7:49:29 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses