Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 17 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:* |
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chamilo
Chamilo chamilo Lms |
|
| Vendors & Products |
Chamilo
Chamilo chamilo Lms |
Mon, 16 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chamilo LMS is a learning management system. Version 1.11.34 and prior contains a SQL Injection vulnerability in the statistics AJAX endpoint. The parameters date_start and date_end from $_REQUEST are embedded directly into a raw SQL string without proper sanitization. Although Database::escape_string() is called downstream, its output is immediately neutralized by str_replace("\'", "'", ...), which restores any injected single quotes — effectively bypassing the escaping mechanism entirely. This allows an authenticated attacker to inject arbitrary SQL statements into the database query, enabling blind time-based and conditional data extraction. This issue has been patched in version 1.11.36. | |
| Title | Chamilo LMS: SQL Injection in the statistics AJAX endpoint | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-16T20:22:42.641Z
Reserved: 2026-03-06T00:04:56.699Z
Link: CVE-2026-30881
Updated: 2026-03-16T20:20:28.457Z
Status : Analyzed
Published: 2026-03-16T20:16:18.640
Modified: 2026-03-17T18:52:41.947
Link: CVE-2026-30881
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:49:51Z