๐Ÿ” CVE Alert

CVE-2026-31941

HIGH 7.7

Server-Side Request Forgery (SSRF) in Chamilo LMS

CVSS Score
7.7
EPSS Score
0.0%
EPSS Percentile
0th

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains a Server-Side Request Forgery (SSRF) vulnerability in the Social Wall feature. The endpoint read_url_with_open_graph accepts a URL from the user via the social_wall_new_msg_main POST parameter and performs two server-side HTTP requests to that URL without validating whether the target is an internal or external resource. This allows an authenticated attacker to force the server to make arbitrary HTTP requests to internal services, scan internal ports, and access cloud instance metadata. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.

CWE CWE-918
Vendor chamilo
Product chamilo-lms
Published Apr 10, 2026
Last Updated Apr 10, 2026
Stay Ahead of the Next One

Get instant alerts for chamilo chamilo-lms

Be the first to know when new high vulnerabilities affecting chamilo chamilo-lms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

chamilo / chamilo-lms
< 1.11.38 >= 2.0.0-alpha.1, < 2.0.0-RC.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-q74c-mx8x-489h github.com: https://github.com/chamilo/chamilo-lms/commit/e3790c5f0ff3b4dc547c2099fadf5c438c1bb265 github.com: https://github.com/chamilo/chamilo-lms/commit/ea6b7b7e90580c9b01dc4bcafe4ad737061e0ead