Description
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via the social_wall_new_msg_main POST parameter and performs two server-side HTTP requests to that URL without validating whether the target is an internal or external resource. This allows an authenticated attacker to force the server to make arbitrary HTTP requests to internal services, scan internal ports, and access cloud instance metadata. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.
Published: 2026-04-10
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Server-Side Request Forgery allowing arbitrary internal requests
Action: Immediate Patch
AI Analysis

Impact

Chamilo LMS exposes a Server-Side Request Forgery in the Social Wall feature, where the read_url_with_open_graph endpoint accepts a URL from users and makes two server-side HTTP requests without validating the target. An attacker who is authenticated can supply any URL, forcing the server to reach internal services, scan ports, or retrieve cloud metadata. This vulnerability enables the disclosure of sensitive data and can serve as a foothold for further internal attacks.

Affected Systems

The flaw exists in Chamilo LMS versions earlier than 1.11.38 on the 1.x branch and earlier than 2.0.0-RC.3 on the 2.x branch. Administrators should verify the installed version and upgrade if it falls into these ranges.

Risk and Exploitability

The CVSS base score of 7.7 indicates high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Because it requires authentication and an internet-reachable endpoint, successful exploitation will depend on obtaining user credentials, after which the attacker can force outbound requests to any host. This could lead to data exfiltration, internal reconnaissance, or further lateral movement.

Generated by OpenCVE AI on April 10, 2026 at 19:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chamilo LMS to version 1.11.38 or later on the 1.x branch, or to 2.0.0-RC.3 or later on the 2.x branch.
  • If upgrading is not immediately possible, disable the Social Wall feature or restrict the read_url_with_open_graph endpoint to a whitelist of approved URLs to prevent arbitrary outbound requests.

Generated by OpenCVE AI on April 10, 2026 at 19:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc2:*:*:*:*:*:*

Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Chamilo
Chamilo chamilo Lms
Vendors & Products Chamilo
Chamilo chamilo Lms

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via the social_wall_new_msg_main POST parameter and performs two server-side HTTP requests to that URL without validating whether the target is an internal or external resource. This allows an authenticated attacker to force the server to make arbitrary HTTP requests to internal services, scan internal ports, and access cloud instance metadata. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.
Title Server-Side Request Forgery (SSRF) in Chamilo LMS
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Chamilo Chamilo Lms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-10T18:33:22.920Z

Reserved: 2026-03-10T15:10:10.655Z

Link: CVE-2026-31941

cve-icon Vulnrichment

Updated: 2026-04-10T18:33:18.498Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T18:16:41.640

Modified: 2026-04-17T21:31:11.793

Link: CVE-2026-31941

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T13:00:02Z

Weaknesses