CVE-2026-30875

Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitrary file upload vulnerability in the H5P Import feature allows authenticated users with Teacher role to achieve Remote Code Execution (RCE). The H5P package validation only checks if h5p.json exists but doesn't block .htaccess or PHP files with alternative extensions. An attacker uploads a crafted H5P package containing a webshell and .htaccess that enables PHP execution for .txt files, bypassing security control. This issue has been patched in version 1.11.36.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*

History

17 Mar 2026, 18:53

Type Values Removed Values Added
First Time Chamilo chamilo Lms
Chamilo
CPE cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*
References () https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.36 - () https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.36 - Product, Release Notes
References () https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-mj4f-8fw2-hrfm - () https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-mj4f-8fw2-hrfm - Vendor Advisory

16 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-16 20:16

Updated : 2026-03-17 18:53


NVD link : CVE-2026-30875

Mitre link : CVE-2026-30875

CVE.ORG link : CVE-2026-30875


JSON object : View

Products Affected

chamilo

  • chamilo_lms
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')