Plattform
php
Komponente
chamilo-lms
Behoben in
1.11.39
CVE-2026-33706 describes a privilege escalation vulnerability within Chamilo LMS, a popular learning management system. An authenticated user with a REST API key can exploit this flaw to modify their user status, potentially elevating their privileges to those of a Teacher or Course Manager. This vulnerability impacts versions 1.11.0 through 1.11.37 and has been resolved in version 1.11.38.
This vulnerability allows authenticated users with a REST API key to manipulate their own user status within the Chamilo LMS. The most significant impact arises when a standard user (typically with a 'student' status) can change their status to 'Teacher/CourseManager'. This elevation grants the attacker the ability to create and manage courses, potentially adding malicious content, enrolling unauthorized users, or modifying existing course materials. The blast radius extends to the entire course catalog and potentially the integrity of the learning environment, as an attacker could compromise the entire system through a single, authenticated user account. This is particularly concerning in multi-user environments where a compromised account could be used to gain access to sensitive student data or administrative functions.
CVE-2026-33706 was publicly disclosed on 2026-04-10. Currently, there are no known public proof-of-concept exploits available. The vulnerability has a CVSS score of 7.1 (HIGH), indicating a moderate probability of exploitation. It is not currently listed on the CISA KEV catalog. Active campaigns targeting this vulnerability are not currently known, but the ease of exploitation warrants monitoring.
Exploit-Status
EPSS
0.03% (8% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-33706 is to upgrade Chamilo LMS to version 1.11.38 or later. If an immediate upgrade is not feasible due to compatibility concerns or system downtime constraints, consider restricting access to the REST API endpoints, specifically the updateuserfrom_username endpoint. Implement strict authentication and authorization controls to ensure only authorized users can access and modify user profiles. Review existing REST API keys and revoke any that are no longer needed or suspect. After upgrading, confirm the fix by attempting to modify a user's status via the REST API with a standard user account; the modification should be denied.
Actualice Chamilo LMS a la versión 1.11.38 o posterior para mitigar la vulnerabilidad de escalada de privilegios. La actualización corrige la forma en que se actualiza el estado del usuario a través de la API REST, evitando que los estudiantes se auto-promocionen a roles de profesor o administrador de curso.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-33706 is a security vulnerability in Chamilo LMS versions 1.11.0 to 1.11.37 that allows authenticated users to escalate their privileges to Teacher/Course Manager, potentially gaining control over courses and users.
You are affected if you are running Chamilo LMS version 1.11.0 through 1.11.37. Upgrade to version 1.11.38 to resolve the vulnerability.
The recommended fix is to upgrade Chamilo LMS to version 1.11.38. As a temporary workaround, restrict access to the updateuserfrom_username endpoint using a WAF or proxy.
Currently, there are no publicly known active campaigns exploiting CVE-2026-33706, but it's crucial to apply the fix proactively.
Refer to the official Chamilo LMS security advisory for detailed information and updates regarding CVE-2026-33706.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.