PT-2025-35787 · Chamilo · Chamilo+1
Published
2025-04-01
·
Updated
2026-03-07
·
CVE-2025-50188
CVSS v2.0
8.5
High
| AV:N/AC:L/Au:S/C:C/I:N/A:C |
Name of the Vulnerable Software and Affected Versions
Chamilo versions prior to 1.11.30
Description
The application does not adequately validate user-supplied data from the GET parameter in scripts located at '/plugin/vchamilo/views/syncparams.php' and '/plugin/vchamilo/ajax/service.php'. This allows an attacker to manipulate database query logic through SQL injection. The issue relates to a lack of validation of XML object sequences within the vChamilo plugin. Exploitation could allow a remote attacker to execute arbitrary SQL queries.
Recommendations
Update to version 1.11.30 or later.
Exploit
Fix
SQL injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Chamilo
Vchamilo Plugin