Unrated severityNVD Advisory· Published Mar 2, 2026· Updated Mar 2, 2026
Error-based SQL Injection in Chamilo LMS
CVE-2025-50188
Description
Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the GET value parameter with the following scripts: /plugin/vchamilo/views/syncparams.php and /plugin/vchamilo/ajax/service.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.
Affected products
1- Range: < 1.11.30
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/chamilo/chamilo-lms/commit/ef54cc0906a3caaa3e7ac9b640b044f03b1fe733mitrex_refsource_MISC
- github.com/chamilo/chamilo-lms/releases/tag/v1.11.30mitrex_refsource_MISC
- github.com/chamilo/chamilo-lms/security/advisories/GHSA-96j3-x45m-9q3rmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.