8
1
1
0
Vulnerability Timeline
8 vulnerabilities discovered over time for Chamilo lms
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-50191 | 7.0 | This vulnerability allows an attacker to manipulate the database of the Chamilo learning management system by sending specially crafted data through a file upload feature, potentially exposing sensitive information or altering data. It affects versions prior to 1.11.30, so users need to update to this version or later to protect against this risk. | chamilochamilo lms | Theoretical | about 1 month agoMar 2, 2026 |
| CVE-2025-50190 | 8.8 | This vulnerability allows an attacker to manipulate the database of the Chamilo learning management system, potentially exposing sensitive information or altering data. It can be exploited by sending specially crafted requests to the system's index.php script, but it has been fixed in version 1.11.30, so users should update to that version to protect themselves. | chamilochamilo lms | Theoretical | about 1 month agoMar 2, 2026 |
| CVE-2025-50189 | 7.2 | This vulnerability allows an attacker to manipulate the database of the Chamilo learning management system by injecting harmful SQL commands through specific user input fields. It can be exploited by anyone sending crafted data to the application before version 1.11.30, potentially leading to unauthorized access or data manipulation. | chamilochamilo lms | Theoretical | about 1 month agoMar 2, 2026 |
| CVE-2025-50188 | 7.0 | This vulnerability allows an attacker to manipulate the database by injecting harmful SQL commands through specific scripts in the Chamilo learning management system, potentially leading to unauthorized access or data modification. It can be exploited by sending specially crafted requests to the affected scripts, and it has been fixed in version 1.11.30. | chamilochamilo lms | Theoretical | about 1 month agoMar 2, 2026 |
| CVE-2025-50187 | 9.8 | This vulnerability allows an attacker to run malicious code on the server hosting the Chamilo learning management system, potentially taking full control of it. It occurs when a specific request is sent without proper checks, and it affects versions prior to 1.11.28, which has since been patched. | chamilochamilo lms | Theoretical | about 1 month agoMar 2, 2026 |
| CVE-2025-50186 | 4.8 | An attacker can upload a specially crafted CSV file that contains malicious code, which can then execute JavaScript when viewed by administrators or users who can access import logs. This vulnerability affects versions prior to 1.11.30 and relies on the attacker being able to upload files with unsafe names. | chamilochamilo lms | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2024-50337 | 5.3 | This vulnerability allows an attacker to trick the Chamilo learning management system into making requests to any URL on the server's behalf, potentially exposing sensitive information. It affects versions prior to 1.11.28 and requires no authentication, making it easier for attackers to exploit. | chamilochamilo lms | Theoretical | about 1 month agoMar 2, 2026 |
| CVE-2024-47886 | 8.7 | This vulnerability allows an attacker with administrative access to the Chamilo learning management system to run any code they want on the server, potentially taking full control of it. It affects versions 1.11.12 to 1.11.26, and has been fixed in the latest version, so it's crucial to update to protect against this risk. | chamilochamilo lms | Theoretical | about 1 month agoMar 2, 2026 |
About Chamilo Chamilo lms Security
This page provides comprehensive security vulnerability tracking for Chamilo Chamilo lms. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Chamilo lms updated to the latest version
- • Subscribe to security advisories from Chamilo
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately