Description
Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated user (including students) can write arbitrary content to files on the server via the BigUpload endpoint. The key parameter controls the filename and the raw POST body becomes the file content. While .php extensions are filtered to .phps, the .pht extension passes through unmodified. On Apache configurations where .pht is handled as PHP, this leads to Remote Code Execution. This vulnerability is fixed in 1.11.38.
Published: 2026-04-10
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch
AI Analysis

Impact

Chamilo Learning Management System allows any authenticated user to write an arbitrary file through the BigUpload endpoint. The key parameter controls the filename, and the entire POST body becomes the file content. While the system normally changes .php extensions to .phps, the .pht extension is not filtered and passes through unchanged. On web server configurations where .pht files are executed as PHP, an attacker can embed malicious code, gaining full remote code execution on the host. The weakness corresponds to improper validation of uploaded file names and types.

Affected Systems

All installations of Chamilo LMS running versions earlier than 1.11.38 are affected. Any user who can authenticate—students, teachers, or administrators—has the ability to upload and overwrite files, so the vulnerability is present across the entire user base of these versions.

Risk and Exploitability

The CVSS score of 7.1 indicates a high level of severity, though the EPSS score is not available. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires authentication to the LMS and an Apache configuration that executes .pht files as PHP; once those conditions are met, execution of arbitrary code is possible. Given the lack of an automated exploit, exploit likelihood is uncertain, but the potential impact of remote code execution makes the risk significant.

Generated by OpenCVE AI on April 10, 2026 at 20:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chamilo LMS to version 1.11.38 or later, which removes the vulnerability in the BigUpload endpoint.

Generated by OpenCVE AI on April 10, 2026 at 20:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*

Mon, 13 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Chamilo
Chamilo chamilo Lms
Vendors & Products Chamilo
Chamilo chamilo Lms

Fri, 10 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Description Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated user (including students) can write arbitrary content to files on the server via the BigUpload endpoint. The key parameter controls the filename and the raw POST body becomes the file content. While .php extensions are filtered to .phps, the .pht extension passes through unmodified. On Apache configurations where .pht is handled as PHP, this leads to Remote Code Execution. This vulnerability is fixed in 1.11.38.
Title Chamilo LMS Affected by Authenticated Arbitrary File Write via BigUpload endpoint
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}


Subscriptions

Chamilo Chamilo Lms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-13T16:04:11.514Z

Reserved: 2026-03-23T17:06:05.746Z

Link: CVE-2026-33704

cve-icon Vulnrichment

Updated: 2026-04-13T16:04:07.830Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T19:16:23.480

Modified: 2026-04-16T18:34:15.600

Link: CVE-2026-33704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:59:45Z

Weaknesses