8.8

CVE-2026-33618

Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformConfigurationController::decodeSettingArray() method uses PHP's eval() to parse platform settings from the database. An attacker with admin access (obtainable via Advisory 1) can inject arbitrary PHP code into the settings, which is then executed when any user (including unauthenticated) requests /platform-config/list. This vulnerability is fixed in 2.0.0-RC.3.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ChamiloChamilo Lms Version2.0.0 Updatealpha1
ChamiloChamilo Lms Version2.0.0 Updatealpha2
ChamiloChamilo Lms Version2.0.0 Updatealpha3
ChamiloChamilo Lms Version2.0.0 Updatealpha4
ChamiloChamilo Lms Version2.0.0 Updatealpha5
ChamiloChamilo Lms Version2.0.0 Updatebeta1
ChamiloChamilo Lms Version2.0.0 Updatebeta2
ChamiloChamilo Lms Version2.0.0 Updatebeta3
ChamiloChamilo Lms Version2.0.0 Updaterc1
ChamiloChamilo Lms Version2.0.0 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.147
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security-advisories@github.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").