CVE-2025-50187

Chamilo is a learning management system. Prior to version 1.11.28, parameter from SOAP request is evaluated without filtering which leads to Remote Code Execution. This issue has been patched in version 1.11.28.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*

History

03 Mar 2026, 19:12

Type Values Removed Values Added
References () https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.28 - () https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.28 - Product, Release Notes
References () https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-356v-7xg2-3678 - () https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-356v-7xg2-3678 - Exploit, Vendor Advisory
First Time Chamilo chamilo Lms
Chamilo
CPE cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*

02 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-02 15:16

Updated : 2026-03-03 19:12


NVD link : CVE-2025-50187

Mitre link : CVE-2025-50187

CVE.ORG link : CVE-2025-50187


JSON object : View

Products Affected

chamilo

  • chamilo_lms
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')