Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1106: Improper Authorization in Chamilo LMS

0
Medium
VulnerabilityCVE-2026-1106cvecve-2026-1106
Published: Sun Jan 18 2026 (01/18/2026, 00:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Chamilo
Product: LMS

Description

CVE-2026-1106 is a medium severity improper authorization vulnerability in Chamilo LMS version 2. 0. 0 Beta 1, specifically in the deleteLegal function of the Legal Consent Handler component. An attacker can remotely manipulate the userId argument to bypass authorization controls and perform unauthorized actions. No authentication or user interaction is required, and the vulnerability can be exploited over the network. Although the vendor has not responded or issued a patch, no known exploits are currently observed in the wild. This flaw could allow attackers to delete or modify legal consent data, potentially impacting data integrity and compliance. European organizations using this LMS, especially educational institutions, should prioritize mitigation to prevent unauthorized data manipulation. The vulnerability has a CVSS 4. 0 base score of 5.

AI-Powered Analysis

AILast updated: 01/18/2026, 01:11:26 UTC

Technical Analysis

CVE-2026-1106 identifies an improper authorization vulnerability in Chamilo LMS up to version 2.0.0 Beta 1, affecting the deleteLegal function within the Legal Consent Handler component (src/CoreBundle/Controller/SocialController.php). The vulnerability arises because the function does not properly validate the userId parameter, allowing an attacker to manipulate this argument remotely to perform unauthorized deletions or modifications of legal consent records. This flaw does not require authentication or user interaction, and the attack vector is network-based, increasing the risk of exploitation. The improper authorization means that an attacker can bypass intended access controls, potentially deleting or altering sensitive legal consent data that may be critical for compliance with data protection regulations such as GDPR. The vendor was notified early but has not responded or released a patch, leaving systems exposed. The CVSS 4.0 score of 5.3 reflects a medium severity, with the attack complexity low and no privileges or user interaction needed. Although no exploits are currently reported in the wild, the public availability of the exploit code increases the likelihood of future attacks. Chamilo LMS is an open-source learning management system widely used by educational institutions and organizations for e-learning, making this vulnerability particularly relevant to entities managing sensitive user data and consent information.

Potential Impact

For European organizations, especially educational institutions and training providers using Chamilo LMS, this vulnerability poses a risk to the confidentiality and integrity of legal consent data. Unauthorized deletion or modification of consent records can lead to non-compliance with GDPR and other data protection laws, potentially resulting in legal penalties and reputational damage. The ability to exploit this vulnerability remotely without authentication increases the attack surface, allowing threat actors to target vulnerable LMS deployments over the internet. Disruption or manipulation of consent data can also undermine trust in the LMS platform and impact the organization's ability to demonstrate lawful data processing. Additionally, if attackers leverage this flaw as part of a broader attack chain, it could facilitate further unauthorized access or data breaches. The medium severity rating suggests a moderate but tangible risk that should not be ignored, particularly given the lack of vendor response and patch availability.

Mitigation Recommendations

1. Immediately restrict network access to the Chamilo LMS instance, limiting it to trusted IP addresses or VPN connections to reduce exposure to remote attackers. 2. Implement strict monitoring and logging of all requests to the deleteLegal function or related endpoints, with alerts for unusual or unauthorized userId parameter manipulations. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function. 4. Conduct a thorough audit of existing legal consent data to identify any unauthorized changes or deletions. 5. Engage with the Chamilo community or security forums to track any unofficial patches or workarounds until an official fix is released. 6. If feasible, consider temporarily disabling or restricting the functionality related to legal consent management until the vulnerability is addressed. 7. Educate LMS administrators about the vulnerability and encourage prompt application of any future vendor patches or updates. 8. Review and strengthen access control mechanisms within the LMS to prevent similar authorization bypass issues in other components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T08:37:17.795Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696c2fcdd302b072d943efbe

Added to database: 1/18/2026, 12:56:45 AM

Last enriched: 1/18/2026, 1:11:26 AM

Last updated: 1/18/2026, 2:56:30 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats