Chamilo is an open-source learning management system (LMS). Version 2.0.0-RC.2 contains a SQL Injection vulnerability in the statistics AJAX endpoint, which is an incomplete fix for CVE-2026-30881. While CVE-2026-30881 was patched by applying Security::remove_XSS() to the date_start and date_end parameters in the get_user_registration_by_month action, the same parameters remain unsanitized in the users_active action within the same file (public/main/inc/ajax/statistics.ajax.php), where they are directly interpolated into a SQL query. An authenticated admin can exploit this to perform time-based blind SQL injection, enabling extraction of arbitrary data from the database. This issue has been fixed in version 2.0.0.
References
| Link | Resource |
|---|---|
| https://github.com/chamilo/chamilo-lms/releases/tag/v2.0.0 | Product Release Notes |
| https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-w8c4-c7r8-qgw2 | Mitigation Vendor Advisory |
Configurations
History
23 Apr 2026, 14:55
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| CPE | cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc2:*:*:*:*:*:* | |
| First Time |
Chamilo chamilo Lms
Chamilo |
|
| References | () https://github.com/chamilo/chamilo-lms/releases/tag/v2.0.0 - Product, Release Notes | |
| References | () https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-w8c4-c7r8-qgw2 - Mitigation, Vendor Advisory |
14 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-14 21:16
Updated : 2026-04-23 14:55
NVD link : CVE-2026-33714
Mitre link : CVE-2026-33714
CVE.ORG link : CVE-2026-33714
JSON object : View
Products Affected
chamilo
- chamilo_lms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
