CVE-2026-1106: Improper Authorization in Chamilo LMS
A security flaw has been discovered in Chamilo LMS up to 2.0.0 Beta 1. This issue affects the function deleteLegal of the file src/CoreBundle/Controller/SocialController.php of the component Legal Consent Handler. Performing a manipulation of the argument userId results in improper authorization. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1106 is a security vulnerability identified in Chamilo LMS up to version 2.0.0 Beta 1, specifically within the deleteLegal function of the Legal Consent Handler component located in src/CoreBundle/Controller/SocialController.php. The vulnerability arises from improper authorization checks when processing the userId argument, allowing an attacker to manipulate this parameter remotely to bypass intended access controls. This flaw enables unauthorized deletion or modification of legal consent data, which could impact compliance and user data integrity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and does not require authentication (PR:L) or user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present, with integrity and availability rated as low impact. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity). The exploit code has been publicly released, increasing the likelihood of exploitation despite the absence of known active attacks in the wild. The vendor was notified early but has not issued a response or patch, leaving users exposed. This vulnerability primarily affects organizations using the specified Chamilo LMS version, especially those managing legal consent data within their e-learning environments.
Potential Impact
The improper authorization vulnerability allows attackers to remotely manipulate userId parameters to delete or alter legal consent records without proper permissions. This can lead to unauthorized data modification or deletion, potentially violating legal compliance requirements related to user consent management. The integrity of consent records is compromised, which may affect audit trails and regulatory adherence. While the availability impact is low, unauthorized deletions could disrupt normal LMS operations or user trust. The lack of authentication requirement and public exploit availability increase the risk of exploitation, especially in environments where Chamilo LMS 2.0.0 Beta 1 is exposed to the internet. Organizations relying on this LMS for critical training or compliance tracking may face operational and reputational damage. The medium CVSS score reflects moderate risk but the real-world impact depends on the sensitivity of the consent data and the deployment context.
Mitigation Recommendations
Since no official patch or vendor response is currently available, organizations should implement immediate compensating controls. These include restricting network access to the Chamilo LMS instance via firewalls or VPNs to limit exposure to trusted users only. Review and harden access control policies around the Legal Consent Handler functionality, if possible, disabling or restricting the deleteLegal function temporarily. Monitor logs for suspicious requests manipulating userId parameters and set up alerts for anomalous deletion activities. Conduct thorough audits of consent data integrity to detect unauthorized changes. Consider upgrading to a later patched version once available or applying custom code fixes to enforce proper authorization checks on the affected function. Additionally, educate administrators about the vulnerability and the importance of limiting LMS exposure until remediation is complete.
Affected Countries
United States, Brazil, France, Spain, Argentina, Mexico, Colombia, Portugal, Italy, Germany
CVE-2026-1106: Improper Authorization in Chamilo LMS
Description
A security flaw has been discovered in Chamilo LMS up to 2.0.0 Beta 1. This issue affects the function deleteLegal of the file src/CoreBundle/Controller/SocialController.php of the component Legal Consent Handler. Performing a manipulation of the argument userId results in improper authorization. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1106 is a security vulnerability identified in Chamilo LMS up to version 2.0.0 Beta 1, specifically within the deleteLegal function of the Legal Consent Handler component located in src/CoreBundle/Controller/SocialController.php. The vulnerability arises from improper authorization checks when processing the userId argument, allowing an attacker to manipulate this parameter remotely to bypass intended access controls. This flaw enables unauthorized deletion or modification of legal consent data, which could impact compliance and user data integrity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and does not require authentication (PR:L) or user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present, with integrity and availability rated as low impact. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity). The exploit code has been publicly released, increasing the likelihood of exploitation despite the absence of known active attacks in the wild. The vendor was notified early but has not issued a response or patch, leaving users exposed. This vulnerability primarily affects organizations using the specified Chamilo LMS version, especially those managing legal consent data within their e-learning environments.
Potential Impact
The improper authorization vulnerability allows attackers to remotely manipulate userId parameters to delete or alter legal consent records without proper permissions. This can lead to unauthorized data modification or deletion, potentially violating legal compliance requirements related to user consent management. The integrity of consent records is compromised, which may affect audit trails and regulatory adherence. While the availability impact is low, unauthorized deletions could disrupt normal LMS operations or user trust. The lack of authentication requirement and public exploit availability increase the risk of exploitation, especially in environments where Chamilo LMS 2.0.0 Beta 1 is exposed to the internet. Organizations relying on this LMS for critical training or compliance tracking may face operational and reputational damage. The medium CVSS score reflects moderate risk but the real-world impact depends on the sensitivity of the consent data and the deployment context.
Mitigation Recommendations
Since no official patch or vendor response is currently available, organizations should implement immediate compensating controls. These include restricting network access to the Chamilo LMS instance via firewalls or VPNs to limit exposure to trusted users only. Review and harden access control policies around the Legal Consent Handler functionality, if possible, disabling or restricting the deleteLegal function temporarily. Monitor logs for suspicious requests manipulating userId parameters and set up alerts for anomalous deletion activities. Conduct thorough audits of consent data integrity to detect unauthorized changes. Consider upgrading to a later patched version once available or applying custom code fixes to enforce proper authorization checks on the affected function. Additionally, educate administrators about the vulnerability and the importance of limiting LMS exposure until remediation is complete.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-17T08:37:17.795Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696c2fcdd302b072d943efbe
Added to database: 1/18/2026, 12:56:45 AM
Last enriched: 2/23/2026, 10:49:07 PM
Last updated: 3/26/2026, 4:00:31 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.