Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the GET value parameter with the following scripts: /plugin/vchamilo/views/syncparams.php and /plugin/vchamilo/ajax/service.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chamilo
Chamilo chamilo Lms |
|
| CPEs | cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Chamilo
Chamilo chamilo Lms |
|
| Metrics |
cvssV3_1
|
Mon, 02 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the GET value parameter with the following scripts: /plugin/vchamilo/views/syncparams.php and /plugin/vchamilo/ajax/service.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30. | |
| Title | Error-based SQL Injection in Chamilo LMS | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-02T14:47:03.234Z
Updated: 2026-03-02T19:23:57.375Z
Reserved: 2025-06-13T19:17:51.727Z
Link: CVE-2025-50188
Updated: 2026-03-02T19:23:43.168Z
Status : Analyzed
Published: 2026-03-02T15:16:30.150
Modified: 2026-03-03T19:12:46.857
Link: CVE-2025-50188
No data.