Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.8

Chamilo Learning Management System: Unsecured File Uploads Allow Code Execution

CVE-2026-29041
Summary

If you use an older version of Chamilo, a hacker can upload a malicious file and execute commands on your server if they have a user account. To fix this, update Chamilo to version 1.11.34 or later. If you can't update right away, consider temporarily blocking file uploads until the update is possible.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
chamilo chamilo_lms <= 1.11.34 –
Original title
Chamilo is a learning management system. Prior to version 1.11.34, Chamilo LMS is affected by an authenticated remote code execution vulnerability caused by improper validation of uploaded files. T...
Original description
Chamilo is a learning management system. Prior to version 1.11.34, Chamilo LMS is affected by an authenticated remote code execution vulnerability caused by improper validation of uploaded files. The application relies solely on MIME-type verification when handling file uploads and does not adequately validate file extensions or enforce safe server-side storage restrictions. As a result, an authenticated low-privileged user can upload a crafted file containing executable code and subsequently execute arbitrary commands on the server. This issue has been patched in version 1.11.34.
nvd CVSS3.1 8.8
Vulnerability type
CWE-434 Unrestricted File Upload
Published: 6 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026