Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.8
Chamilo Learning Management System: Unfiltered SOAP Request Allows Hacker Access
CVE-2025-50187
Summary
If an attacker sends a malicious request to Chamilo's learning management system, they can potentially gain access to the server and execute unauthorized code. This is a serious issue because it could allow a hacker to take control of the system. To fix this, update to version 1.11.28 or later.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| chamilo | chamilo_lms | <= 1.11.28 | – |
Original title
Chamilo is a learning management system. Prior to version 1.11.28, parameter from SOAP request is evaluated without filtering which leads to Remote Code Execution. This issue has been patched in ve...
Original description
Chamilo is a learning management system. Prior to version 1.11.28, parameter from SOAP request is evaluated without filtering which leads to Remote Code Execution. This issue has been patched in version 1.11.28.
nvd CVSS3.1
9.8
Vulnerability type
CWE-95
- https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.28 Product Release Notes
- https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-356v-7xg2-3678 Exploit Vendor Advisory
Published: 2 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026