Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.2

Chamilo Learning Management System: SQL Injection via Unvalidated User Input

CVE-2025-50189
Summary

The Chamilo learning management system fails to properly check user input, which allows attackers to inject malicious SQL code and manipulate database queries. This could lead to unauthorized access to sensitive data or disruption of the system. Update to version 1.11.30 or later to fix this issue.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
chamilo chamilo_lms <= 1.11.30 –
Original title
Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the POST resource[document][SQL_INJECTION_HERE]...
Original description
Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the POST resource[document][SQL_INJECTION_HERE] and POST login parameters found in /main/coursecopy/copy_course_session_selected.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.
nvd CVSS3.1 8.8
nvd CVSS4.0 7.2
Vulnerability type
CWE-89 SQL Injection
Published: 2 Mar 2026 · Updated: 13 Mar 2026 · First seen: 6 Mar 2026