PT-2025-35787 · Chamilo · Chamilo+1

Published

2025-04-01

·

Updated

2026-03-07

·

CVE-2025-50188

CVSS v2.0

8.5

High

AV:N/AC:L/Au:S/C:C/I:N/A:C
Name of the Vulnerable Software and Affected Versions Chamilo versions prior to 1.11.30
Description The application does not adequately validate user-supplied data from the GET parameter in scripts located at '/plugin/vchamilo/views/syncparams.php' and '/plugin/vchamilo/ajax/service.php'. This allows an attacker to manipulate database query logic through SQL injection. The issue relates to a lack of validation of XML object sequences within the vChamilo plugin. Exploitation could allow a remote attacker to execute arbitrary SQL queries.
Recommendations Update to version 1.11.30 or later.

Exploit

Fix

SQL injection

Weakness Enumeration

Related Identifiers

BDU:2025-06901
CVE-2025-50188
GHSA-96J3-X45M-9Q3R

Affected Products

Chamilo
Vchamilo Plugin