7.1

CVE-2026-33702

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an Insecure Direct Object Reference (IDOR) vulnerability in the Learning Path progress saving endpoint. The file lp_ajax_save_item.php accepts a uid (user ID) parameter directly from $_REQUEST and uses it to load and modify another user's Learning Path progress — including score, status, completion, and time — without verifying that the requesting user matches the target user ID. Any authenticated user enrolled in a course can overwrite another user's Learning Path progress by simply changing the uid parameter in the request. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ChamiloChamilo Lms Version < 1.11.38
ChamiloChamilo Lms Version2.0.0 Updatealpha1
ChamiloChamilo Lms Version2.0.0 Updatealpha2
ChamiloChamilo Lms Version2.0.0 Updatealpha3
ChamiloChamilo Lms Version2.0.0 Updatealpha4
ChamiloChamilo Lms Version2.0.0 Updatealpha5
ChamiloChamilo Lms Version2.0.0 Updatebeta1
ChamiloChamilo Lms Version2.0.0 Updatebeta2
ChamiloChamilo Lms Version2.0.0 Updatebeta3
ChamiloChamilo Lms Version2.0.0 Updaterc1
ChamiloChamilo Lms Version2.0.0 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.098
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security-advisories@github.com 7.1 2.8 4.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
CWE-639 Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.