Description
Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without canonicalization or traversal checks. This vulnerability is fixed in 1.11.38.
Published: 2026-04-10
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Deletion
Action: Immediate Patch
AI Analysis

Impact

A path traversal flaw in the Chamilo Learning Management System allows an attacker to delete any file that the web server’s PHP process can access. The vulnerability is triggered by user input that is appended to a filesystem path in the file main/exercise/savescores.php without any path validation. This flaw is classified as a Path Traversal (CWE‑22) and a Relative Path Traversal (CWE‑73) attack, giving the attacker control over which file is targeted for removal.

Affected Systems

All deployments of Chamilo LMS earlier than version 1.11.38 are vulnerable. The affected code resides in the public‑facing script main/exercise/savescores.php. Users with any level of access to the web interface can potentially trigger the removal of critical course files or other system data if the server’s directory permissions grant write or delete rights.

Risk and Exploitability

The issue carries a high severity rating. Exploitation can be achieved remotely by sending crafted HTTP requests to the web interface, allowing the deletion of arbitrary files. Although no official exploitation probability score is available, the described path traversal makes the vulnerability readily exploitable. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog, but the potential for widespread data loss warrants a high-priority response.

Generated by OpenCVE AI on April 10, 2026 at 20:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading Chamilo LMS to version 1.11.38 or later
  • If an upgrade cannot be performed immediately, restrict access to the main/exercise/savescores.php endpoint to trusted users or IP ranges
  • As a temporary mitigation, remove or rename the vulnerable script from the web root so it cannot be invoked
  • Ensure that file deletion operations within the application are guarded by proper authentication and authorization checks
  • Deploy a web application firewall rule to detect and block requests containing path traversal patterns

Generated by OpenCVE AI on April 10, 2026 at 20:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*

Mon, 13 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Chamilo
Chamilo chamilo Lms
Vendors & Products Chamilo
Chamilo chamilo Lms

Fri, 10 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without canonicalization or traversal checks. This vulnerability is fixed in 1.11.38.
Title Path Traversal (Arbitrary File Delete) in Chamilo LMS
Weaknesses CWE-22
CWE-73
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H'}


Subscriptions

Chamilo Chamilo Lms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-13T15:36:34.681Z

Reserved: 2026-03-10T15:10:10.655Z

Link: CVE-2026-31939

cve-icon Vulnrichment

Updated: 2026-04-13T15:24:51.999Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T18:16:41.313

Modified: 2026-04-17T21:23:42.527

Link: CVE-2026-31939

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T13:00:05Z

Weaknesses