| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-40291 | Chamilo LMS has Privilege Escalation via API User Role Modification | chamilo | chamilo-lms | High | 8.8 | 2026-04-14 21:37:55 | Deep Dive |
| CVE-2026-35196 | Chamilo LMS has OS Command Injection via export_all_certificates action | chamilo | chamilo-lms | High | 8.8 | 2026-04-14 21:33:14 | Deep Dive |
| CVE-2026-34602 | Chamilo LMS: IDOR in /api/course_rel_users Allows Unauthorized Enrollment of Arbitrary Users into Courses | chamilo | chamilo-lms | High | 7.1 | 2026-04-14 21:29:07 | Deep Dive |
| CVE-2026-34370 | Chamilo LMS: IDOR in the Notebook Module allows an attacker to view other users' private notes | chamilo | chamilo-lms | Medium | 6.5 | 2026-04-14 21:25:29 | Deep Dive |
| CVE-2026-34161 | Chamilo LMS: Stored XSS via Malicious File Upload in Social Post Attachments Leads to Arbitrary JavaScript Execution | chamilo | chamilo-lms | 中危 | - | 2026-04-14 21:12:48 | Deep Dive |
| CVE-2026-34160 | Chamilo LMS: Unauthenticated SSRF via PENS Plugin allows attacker to probe internal network and reach cloud metadata services | chamilo | chamilo-lms | High | 8.6 | 2026-04-14 21:09:37 | Deep Dive |
| CVE-2026-33715 | Chamilo LMS has Unauthenticated SSRF and Open Email Relay via install.ajax.php test_mailer action | chamilo | chamilo-lms | High | 7.2 | 2026-04-14 21:05:35 | Deep Dive |
| CVE-2026-33714 | Chamilo LMS has Authenticated SQL Injection in statistics.ajax.php users_active action (2.0 RC2) | chamilo | chamilo-lms | 中危 | - | 2026-04-14 21:00:19 | Deep Dive |
| CVE-2026-33737 | Chamilo LMS has an XML External Entity (XXE) Injection | chamilo | chamilo-lms | Medium | 5.3 | 2026-04-10 19:05:09 | Deep Dive |
| CVE-2026-33736 | Chamilo LMS has an Insecure Direct Object Reference (IDOR) - User Data Exposure | chamilo | chamilo-lms | Medium | 6.5 | 2026-04-10 19:03:19 | Deep Dive |
| CVE-2026-33710 | Chamilo LMS has Weak REST API Key Generation (Predictable) | chamilo | chamilo-lms | High | 7.5 | 2026-04-10 18:59:24 | Deep Dive |
| CVE-2026-33708 | Chamilo LMS has REST API PII Exposure via get_user_info_from_username | chamilo | chamilo-lms | Medium | 6.5 | 2026-04-10 18:54:35 | Deep Dive |
| CVE-2026-33707 | Weak Password Recovery Mechanism for Forgotten Password in chamilo/chamilo-lms | chamilo | chamilo-lms | Critical | 9.4 | 2026-04-10 18:52:54 | Deep Dive |
| CVE-2026-33706 | Chamilo LMS has a REST API Self-Privilege Escalation (Student → Teacher) | chamilo | chamilo-lms | High | 7.1 | 2026-04-10 18:51:24 | Deep Dive |
| CVE-2026-33705 | Chamilo LMS has unauthenticated access to Twig template source files exposes application logic | chamilo | chamilo-lms | Medium | 5.3 | 2026-04-10 18:32:45 | Deep Dive |
| CVE-2026-33704 | Chamilo LMS Affected by Authenticated Arbitrary File Write via BigUpload endpoint | chamilo | chamilo-lms | High | 7.1 | 2026-04-10 18:30:48 | Deep Dive |
| CVE-2026-33703 | Chamilo LMS Critical IDOR: Any Authenticated User Can Extract All Users’ Personal Data and API Tokens | chamilo | chamilo-lms | 中危 | - | 2026-04-10 18:23:01 | Deep Dive |
| CVE-2026-33702 | Chamilo LMS has an Insecure Direct Object Reference (IDOR) | chamilo | chamilo-lms | High | 7.1 | 2026-04-10 18:15:50 | Deep Dive |
| CVE-2026-33698 | Chamilo LMS affected by unauthenticated RCE in main/install folder | chamilo | chamilo-lms | 中危 | - | 2026-04-10 18:14:17 | Deep Dive |
| CVE-2026-33618 | Chamilo LMS Affected by Remote Code Execution via eval() in Platform Settings | chamilo | chamilo-lms | High | 8.8 | 2026-04-10 18:10:17 | Deep Dive |