Description
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an unrestricted file upload vulnerability in the exercise sound upload function allows an authenticated teacher to upload a PHP webshell by spoofing the Content-Type header to audio/mpeg. The uploaded file retains its original .php extension and is placed in a web-accessible directory, enabling Remote Code Execution as the web server user (www-data). This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.
Published: 2026-04-10
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via arbitrary file upload by authenticated teacher
Action: Apply patch
AI Analysis

Impact

Chamilo LMS allows an authenticated teacher to upload a file named with a .php extension to an exercise sound upload endpoint that only validates the MIME type. By setting the Content‑Type header to audio/mpeg, the upload is accepted and the PHP file is stored in a publicly accessible directory. The web server then executes the file as code, giving the attacker the ability to run arbitrary commands as the web server user (www‑data). This results in full compromise of confidentiality, integrity, and availability of the affected application.

Affected Systems

The vulnerability affects Chamilo LMS versions prior to 1.11.38 and 2.0.0‑RC.3. Only the Chamilo LMS product is impacted, and the affected deployments include any installations that have not applied the 1.11.38 release or the 2.0.0‑RC.3 release. The issue is present in the exercise sound upload feature accessible by any user with a teacher role.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, and the lack of an EPSS score means the exploit probability is not quantified. The vulnerability is not listed in the CISA KEV catalog. A successful exploitation requires authentication as a teacher and access to the exercise configuration interface, which normally allows file uploads. The attacker can exploit the path by uploading a malicious PHP file, achieving remote code execution on the host server. The risk is significant for organizations that rely on Chamilo LMS for their learning platform and have teacher accounts exposed to potential attackers.

Generated by OpenCVE AI on April 10, 2026 at 19:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chamilo LMS to version 1.11.38 or later, or to 2.0.0‑RC.3 or later.

Generated by OpenCVE AI on April 10, 2026 at 19:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc2:*:*:*:*:*:*

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Chamilo
Chamilo chamilo Lms
Vendors & Products Chamilo
Chamilo chamilo Lms

Fri, 10 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Description Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, an unrestricted file upload vulnerability in the exercise sound upload function allows an authenticated teacher to upload a PHP webshell by spoofing the Content-Type header to audio/mpeg. The uploaded file retains its original .php extension and is placed in a web-accessible directory, enabling Remote Code Execution as the web server user (www-data). This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.
Title Chamilo LMS has Arbitrary File Upload via MIME-Only Validation in Exercise Sound Upload Leads to RCE
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Chamilo Chamilo Lms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-15T14:56:10.732Z

Reserved: 2026-03-17T00:05:53.282Z

Link: CVE-2026-32931

cve-icon Vulnrichment

Updated: 2026-04-15T14:56:05.726Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T18:16:42.430

Modified: 2026-04-17T21:27:59.237

Link: CVE-2026-32931

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:59:57Z

Weaknesses