Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 03 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chamilo
Chamilo chamilo Lms |
|
| CPEs | cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Chamilo
Chamilo chamilo Lms |
Mon, 02 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chamilo is a learning management system. Prior to version 1.11.30, a logic vulnerability in the friend request workflow of Chamilo’s social network module allows an authenticated user to forcibly add any user as a friend by directly calling the AJAX endpoint. The attacker can bypass the normal flow of sending and accepting friend requests, and even add non-existent users. This breaks access control and social interaction logic, with potential privacy implications. This issue has been patched in version 1.11.30. | |
| Title | Chamilo: Friend Request Workflow Bypass - Unauthorized Friend Addition and ID Validation Bypass | |
| Weaknesses | CWE-841 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-02T20:18:16.099Z
Reserved: 2025-06-17T02:28:39.716Z
Link: CVE-2025-52469
Updated: 2026-03-02T20:18:09.265Z
Status : Analyzed
Published: 2026-03-02T16:16:21.330
Modified: 2026-03-03T18:23:26.850
Link: CVE-2025-52469
No data.
OpenCVE Enrichment
Updated: 2026-03-03T08:43:06Z