Description
Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, any authenticated user (including ROLE_STUDENT) can enumerate all platform users and access personal information (email, phone, roles) via GET /api/users, including administrator accounts. This vulnerability is fixed in 2.0.0-RC.3.
Published: 2026-04-10
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized disclosure of user data via IDOR
Action: Patch Now
AI Analysis

Impact

The Chamilo Learning Management System suffers from an Insecure Direct Object Reference that lets any authenticated user— even those with student role— query the /api/users endpoint and retrieve a list of all platform users along with their email addresses, phone numbers, and role assignments. Because administrator accounts are also included, the flaw results in a broad exposure of sensitive personal information. This is a classic IDOR weakness that compromises confidentiality but does not provide direct code execution or denial‑of‑service capabilities.

Affected Systems

The issue affects the chamilo:chamilo-lms product for all versions released before 2.0.0‑RC.3. Upgrading to 2.0.0‑RC.3 or a later release eliminates the vulnerability.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, reflecting the requirement for authentication and the confidentiality impact. No exploit has yet appeared in the wild and the vulnerability is not listed in the CISA KEV backlog, but the attackvector is wide—any authenticated user can issue a GET request over network to the API endpoint. If an attacker compromises a user account or obtains valid credentials, they can enumerate the entire user base and leak personal data. Because the fault is controlled by the application logic, exploitation does not need special hardware or environment constraints, making it likely to be leveraged once a legitimate login occurs.

Generated by OpenCVE AI on April 10, 2026 at 20:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Chamilo LMS to version 2.0.0‑RC.3 or later to remove the IDOR flaw.
  • Verify that the /api/users endpoint no longer returns user data to non‑administrator roles after the upgrade.
  • If upgrading is delayed, configure access controls to restrict the /api/users endpoint so only users with administrator privileges can query it; alternatively, deploy WAF rules to block such requests from other roles.

Generated by OpenCVE AI on April 10, 2026 at 20:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc2:*:*:*:*:*:*

Mon, 13 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Chamilo
Chamilo chamilo Lms
Vendors & Products Chamilo
Chamilo chamilo Lms

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description Chamilo LMS is a learning management system. Prior to 2.0.0-RC.3, any authenticated user (including ROLE_STUDENT) can enumerate all platform users and access personal information (email, phone, roles) via GET /api/users, including administrator accounts. This vulnerability is fixed in 2.0.0-RC.3.
Title Chamilo LMS has an Insecure Direct Object Reference (IDOR) - User Data Exposure
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Chamilo Chamilo Lms
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-13T20:55:46.727Z

Reserved: 2026-03-23T17:34:57.561Z

Link: CVE-2026-33736

cve-icon Vulnrichment

Updated: 2026-04-13T20:55:43.662Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-10T19:16:24.410

Modified: 2026-04-16T18:23:31.127

Link: CVE-2026-33736

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:59:38Z

Weaknesses