Impact
Chamilo LMS versions 1.11.34 and earlier contain a SQL Injection vulnerability in the statistics AJAX endpoint. The parameters date_start and date_end are incorporated directly into a raw SQL string. Although Database::escape_string() is invoked, its output is later neutralized by a str_replace that restores injected single quotes, effectively bypassing the escaping mechanism. This flaw enables an authenticated attacker to inject arbitrary SQL statements, resulting in blind time‑based or conditional data extraction, thus compromising database confidentiality.
Affected Systems
Affected only Chamilo LMS (chamilo:chamilo-lms) running versions 1.11.34 and older. The fix has been released in 1.11.36.
Risk and Exploitability
The CVSS base score is 8.8, indicating high severity, while the EPSS score is below 1 %, suggesting a low likelihood of exploitation currently. It is not listed in the CISA KEV catalog. The vulnerability is exploitable via the web interface’s AJAX endpoint and requires authentication, implying the attack vector is remote but authenticated. No official workaround is available; patching is the only effective remedy.
OpenCVE Enrichment