Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformConfigurationController::decodeSettingArray() method uses PHP's eval() to parse platform settings from the database. An attacker with admin access (obtainable via Advisory 1) can inject arbitrary PHP code into the settings, which is then executed when any user (including unauthenticated) requests /platform-config/list. This vulnerability is fixed in 2.0.0-RC.3.
References
Configurations
Configuration 1 (hide)
|
History
17 Apr 2026, 22:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/chamilo/chamilo-lms/commit/f2c382c94a3f153a4d7e5ce5686c5a219fd09b3b - Patch | |
| References | () https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-hp4w-jmwc-pg7w - Vendor Advisory | |
| First Time |
Chamilo chamilo Lms
Chamilo |
|
| CPE | cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha2:*:*:*:*:*:* cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha3:*:*:*:*:*:* cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha1:*:*:*:*:*:* cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha5:*:*:*:*:*:* cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha4:*:*:*:*:*:* cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta3:*:*:*:*:*:* |
10 Apr 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-10 19:16
Updated : 2026-04-17 22:03
NVD link : CVE-2026-33618
Mitre link : CVE-2026-33618
CVE.ORG link : CVE-2026-33618
JSON object : View
Products Affected
chamilo
- chamilo_lms
CWE
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
