๐Ÿ” CVE Alert

CVE-2026-30881

HIGH 8.8

Chamilo LMS: SQL Injection in the statistics AJAX endpoint

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

Chamilo LMS is a learning management system. Version 1.11.34 and prior contains a SQL Injection vulnerability in the statistics AJAX endpoint. The parameters date_start and date_end from $_REQUEST are embedded directly into a raw SQL string without proper sanitization. Although Database::escape_string() is called downstream, its output is immediately neutralized by str_replace("\'", "'", ...), which restores any injected single quotes โ€” effectively bypassing the escaping mechanism entirely. This allows an authenticated attacker to inject arbitrary SQL statements into the database query, enabling blind time-based and conditional data extraction. This issue has been patched in version 1.11.36.

CWE CWE-89
Vendor chamilo
Product chamilo-lms
Published Mar 16, 2026
Last Updated Mar 16, 2026
Stay Ahead of the Next One

Get instant alerts for chamilo chamilo-lms

Be the first to know when new high vulnerabilities affecting chamilo chamilo-lms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

chamilo / chamilo-lms
< 1.11.36

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-5ggx-x2cv-4h44 github.com: https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.36