Description
Chamilo LMS is a learning management system. Chamilo LMS version 1.11.34 and prior contains a Reflected Cross-Site Scripting (XSS) vulnerability in the session category listing page. The keyword parameter from $_REQUEST is echoed directly into an HTML href attribute without any encoding or sanitization. An attacker can inject arbitrary HTML/JavaScript by breaking out of the attribute context using ">followed by a malicious payload. The vulnerability is triggered when the pagination controls are rendered — which occurs when the number of session categories exceeds 20 (the page limit). This issue has been patched in version 1.11.36.
Published: 2026-03-16
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross-Site Scripting
Action: Apply Patch
AI Analysis

Impact

Chamilo LMS 1.11.34 and prior contain a Reflected Cross‑Site Scripting vulnerability on the session category listing page. The keyword parameter from $_REQUEST is echoed directly into an HTML href attribute without encoding or sanitization, allowing an attacker to inject arbitrary HTML or JavaScript by breaking out of the attribute context. This flaw is triggered only when the pagination controls are rendered, i.e., when the number of session categories exceeds twenty. The attack can enable script execution in the victim’s browser, potentially leading to session hijacking, data theft, or defacement.

Affected Systems

The vulnerability affects the Chamilo Learning Management System product (cpe:2.3:a:chamilo:chamilo_lms:*) with version 1.11.34 and all earlier releases. The issue was resolved in version 1.11.36.

Risk and Exploitability

The CVSS v3.1 score is 6.1, indicating a medium severity level. EPSS probability is below 1%, so the likelihood of exploitation is considered low. The vulnerability is not listed in the CISA KEV catalog, suggesting no widespread, known exploitation at the time of disclosure. Exploitation requires an attacker to craft a URL containing a malicious keyword parameter and lure a victim to the session category listing page where pagination is present. Once the victim views the link, the injected script executes within their browser context. No remote code execution or privilege escalation on the server is possible from the information provided.

Generated by OpenCVE AI on March 17, 2026 at 20:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Chamilo LMS version 1.11.36 or later to eliminate the reflected XSS flaw.

Generated by OpenCVE AI on March 17, 2026 at 20:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Chamilo
Chamilo chamilo Lms
Vendors & Products Chamilo
Chamilo chamilo Lms

Mon, 16 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description Chamilo LMS is a learning management system. Chamilo LMS version 1.11.34 and prior contains a Reflected Cross-Site Scripting (XSS) vulnerability in the session category listing page. The keyword parameter from $_REQUEST is echoed directly into an HTML href attribute without any encoding or sanitization. An attacker can inject arbitrary HTML/JavaScript by breaking out of the attribute context using ">followed by a malicious payload. The vulnerability is triggered when the pagination controls are rendered — which occurs when the number of session categories exceeds 20 (the page limit). This issue has been patched in version 1.11.36.
Title Chamilo LMS: Reflected XSS in the session category listing page
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Chamilo Chamilo Lms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T20:22:42.453Z

Reserved: 2026-03-06T00:04:56.699Z

Link: CVE-2026-30882

cve-icon Vulnrichment

Updated: 2026-03-16T20:20:26.378Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T20:16:18.790

Modified: 2026-03-17T18:52:21.880

Link: CVE-2026-30882

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:49:51Z

Weaknesses