Description
Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, an Insecure Direct Object Reference (IDOR) vulnerability in the REST API stats endpoint allows any authenticated user (including low-privilege students with ROLE_USER) to read any other user's learning progress, certificates, and gradebook scores for any course, without enrollment or supervisory relationship. This vulnerability is fixed in 2.0.0-RC.3.
Published: 2026-04-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality breach of user learning data
Action: Patch immediately
AI Analysis

Impact

An insecure direct object reference in the REST API stats endpoint permits any authenticated user, regardless of role, to retrieve another user's learning progress, certificates, and gradebook scores for any course. This unauthorized disclosure breaches confidentiality and exposes sensitive educational records, while the lack of enrollment or supervisory checks creates a wide attack surface.

Affected Systems

Chamilo Learning Management System installations running versions prior to 2.0.0‑RC.3 are affected. The vulnerability applies across all deployments where the REST API stats endpoint is accessed by authenticated users, including community‑edited configurations.

Risk and Exploitability

The CVSS score of 6.5 indicates medium severity, and the absence of an EPSS score suggests that there is no current public exploitation data. It is not listed in the CISA KEV catalog. Extrapolating from the description, an attacker only needs valid credentials and the ability to issue API requests; therefore the vulnerability is exploitable in any environment where authenticated users can reach the endpoint.

Generated by OpenCVE AI on April 10, 2026 at 19:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Chamilo LMS to version 2.0.0‑RC.3 or later to remove the IDOR vulnerability.
  • If immediate upgrade is not possible, disable or secure the stats API endpoint to require enrollment or supervisory checks.
  • Monitor API activity logs for suspicious access patterns to user data.

Generated by OpenCVE AI on April 10, 2026 at 19:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc2:*:*:*:*:*:*

Tue, 14 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Chamilo
Chamilo chamilo Lms
Vendors & Products Chamilo
Chamilo chamilo Lms

Fri, 10 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Description Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, an Insecure Direct Object Reference (IDOR) vulnerability in the REST API stats endpoint allows any authenticated user (including low-privilege students with ROLE_USER) to read any other user's learning progress, certificates, and gradebook scores for any course, without enrollment or supervisory relationship. This vulnerability is fixed in 2.0.0-RC.3.
Title Chamilo LMS has an IDOR in REST API Stats Endpoint Exposes Any User's Learning Data
Weaknesses CWE-639
CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Chamilo Chamilo Lms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-14T14:06:11.889Z

Reserved: 2026-03-17T20:35:49.929Z

Link: CVE-2026-33141

cve-icon Vulnrichment

Updated: 2026-04-14T14:06:00.913Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T18:16:42.743

Modified: 2026-04-17T21:24:02.230

Link: CVE-2026-33141

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:59:52Z

Weaknesses