Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-66447— Chamilo LMS has validation-less redirect on login page

EPSS 0.03% · P10
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-66447

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Chamilo LMS has validation-less redirect on login page
Source: NVD (National Vulnerability Database)
Vulnerability Description
Chamilo LMS is a learning management system. From 1.11.0 to 2.0-beta.1, anyone can trigger a malicious redirect through the use of the redirect parameter to /login. This vulnerability is fixed in 2.0-beta.2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
指向未可信站点的URL重定向(开放重定向)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Chamilo LMS 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Chamilo LMS是Chamilo开源的一套开源的在线学习和协作系统。该系统支持创建教学内容、远程培训和在线答题等。 Chamilo LMS 1.11.0至2.0-beta.1版本存在输入验证错误漏洞,该漏洞源于重定向参数处理不当,可能导致恶意重定向。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
chamilochamilo-lms >= 1.11.0, < 2.0.0-RC.3 -

II. Public POCs for CVE-2025-66447

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-66447

登录查看更多情报信息。

Same Patch Batch · chamilo · 2026-04-10 · 23 CVEs total

CVE-2026-337079.4 CRITICALWeak Password Recovery Mechanism for Forgotten Password in chamilo/chamilo-lms
CVE-2026-328929.1 CRITICALOS Command Injection in Chamilo LMS 1.11.36
CVE-2026-336188.8 HIGHChamilo LMS Affected by Remote Code Execution via eval() in Platform Settings
CVE-2026-319398.3 HIGHPath Traversal (Arbitrary File Delete) in Chamilo LMS
CVE-2026-319417.7 HIGHServer-Side Request Forgery (SSRF) in Chamilo LMS
CVE-2026-337107.5 HIGHChamilo LMS has Weak REST API Key Generation (Predictable)
CVE-2026-319407.5 HIGHSession Fixation in Chamilo LMS
CVE-2026-329317.5 HIGHChamilo LMS has Arbitrary File Upload via MIME-Only Validation in Exercise Sound Upload Le
CVE-2026-328947.1 HIGHChamilo LMS has an IDOR in Gradebook Allows Cross-Course Deletion of Any Student's Grade R
CVE-2026-337067.1 HIGHChamilo LMS has a REST API Self-Privilege Escalation (Student → Teacher)
CVE-2026-337027.1 HIGHChamilo LMS has an Insecure Direct Object Reference (IDOR)
CVE-2026-337047.1 HIGHChamilo LMS Affected by Authenticated Arbitrary File Write via BigUpload endpoint
CVE-2026-329307.1 HIGHChamilo LMS has an IDOR in Gradebook Allows Cross-Course Evaluation Edit Without Ownership
CVE-2026-337086.5 MEDIUMChamilo LMS has REST API PII Exposure via get_user_info_from_username
CVE-2026-337366.5 MEDIUMChamilo LMS has an Insecure Direct Object Reference (IDOR) - User Data Exposure
CVE-2026-331416.5 MEDIUMChamilo LMS has an IDOR in REST API Stats Endpoint Exposes Any User's Learning Data
CVE-2026-328935.4 MEDIUMChamilo LMS has Reflected XSS via Unsanitized http_build_query() in Exercise Question List
CVE-2026-337055.3 MEDIUMChamilo LMS has unauthenticated access to Twig template source files exposes application l
CVE-2026-337375.3 MEDIUMChamilo LMS has an XML External Entity (XXE) Injection
CVE-2026-329324.7 MEDIUMChamilo LMS has an Open Redirect via Unvalidated 'page' Parameter in Session Course Edit

Showing top 20 of 23 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-66447

No comments yet


Leave a comment