Impact
Chamilo Learning Management System allows an attacker to retrieve Twig template files without authentication. These files reveal internal application logic, variable names, AJAX endpoint URLs, and the structure of the administrative interface, constituting a form of information disclosure that could assist an adversary in understanding the system and planning further attacks.
Affected Systems
The vulnerability affects Chamilo LMS releases earlier than version 1.11.38. Users operating any of those earlier releases have direct HTTP access to the /main/template/default/ directory where the .tpl files reside.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium severity risk. No EPSS data is available, and the issue is not listed in the CISA KEV catalog. Exploitation requires only an unauthenticated HTTP GET request to a template file path, making it straightforward to discover. The primary impact is information disclosure, but the lack of authentication barriers makes the risk moderate enough to warrant prompt remediation.
OpenCVE Enrichment