Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.8
Chamilo Learning Management System: Unsecured File Uploads Allow Code Execution
CVE-2026-29041
Summary
If you use an older version of Chamilo, a hacker can upload a malicious file and execute commands on your server if they have a user account. To fix this, update Chamilo to version 1.11.34 or later. If you can't update right away, consider temporarily blocking file uploads until the update is possible.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| chamilo | chamilo_lms | <= 1.11.34 | – |
Original title
Chamilo is a learning management system. Prior to version 1.11.34, Chamilo LMS is affected by an authenticated remote code execution vulnerability caused by improper validation of uploaded files. T...
Original description
Chamilo is a learning management system. Prior to version 1.11.34, Chamilo LMS is affected by an authenticated remote code execution vulnerability caused by improper validation of uploaded files. The application relies solely on MIME-type verification when handling file uploads and does not adequately validate file extensions or enforce safe server-side storage restrictions. As a result, an authenticated low-privileged user can upload a crafted file containing executable code and subsequently execute arbitrary commands on the server. This issue has been patched in version 1.11.34.
nvd CVSS3.1
8.8
Vulnerability type
CWE-434
Unrestricted File Upload
Published: 6 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026