Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-32892— OS Command Injection in Chamilo LMS 1.11.36

CVSS 9.1 · Critical EPSS 0.12% · P30
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-32892

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OS Command Injection in Chamilo LMS 1.11.36
Source: NVD (National Vulnerability Database)
Vulnerability Description
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an OS Command Injection vulnerability in the file move function. The move() function in fileManage.lib.php passes user-controlled path values directly into exec() shell commands without using escapeshellarg(). When a user moves a document via document.php, the move_to POST parameter — which only passes through Security::remove_XSS() (an HTML-only filter) — is concatenated directly into shell commands such as exec("mv $source $target"). By default, Chamilo allows all authenticated users to create courses (allow_users_to_create_courses = true). Any user who is a teacher in a course (including self-created courses) can move documents, making this vulnerability exploitable by any authenticated user. The attacker must first place a directory with shell metacharacters in its name on the filesystem (achievable via Course Backup Import), then move a document into that directory to trigger arbitrary command execution as the web server user (www-data). This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Chamilo LMS 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Chamilo LMS是Chamilo开源的一套开源的在线学习和协作系统。该系统支持创建教学内容、远程培训和在线答题等。 Chamilo LMS 1.11.38之前版本和2.0.0-RC.3之前版本存在操作系统命令注入漏洞,该漏洞源于fileManage.lib.php中move函数将用户控制的路径值直接传递给exec命令,可能导致OS命令注入攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
chamilochamilo-lms < 1.11.38 -

II. Public POCs for CVE-2026-32892

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-32892

登录查看更多情报信息。

Same Patch Batch · chamilo · 2026-04-10 · 23 CVEs total

CVE-2026-337079.4 CRITICALWeak Password Recovery Mechanism for Forgotten Password in chamilo/chamilo-lms
CVE-2026-336188.8 HIGHChamilo LMS Affected by Remote Code Execution via eval() in Platform Settings
CVE-2026-319398.3 HIGHPath Traversal (Arbitrary File Delete) in Chamilo LMS
CVE-2026-319417.7 HIGHServer-Side Request Forgery (SSRF) in Chamilo LMS
CVE-2026-329317.5 HIGHChamilo LMS has Arbitrary File Upload via MIME-Only Validation in Exercise Sound Upload Le
CVE-2026-319407.5 HIGHSession Fixation in Chamilo LMS
CVE-2026-337107.5 HIGHChamilo LMS has Weak REST API Key Generation (Predictable)
CVE-2026-329307.1 HIGHChamilo LMS has an IDOR in Gradebook Allows Cross-Course Evaluation Edit Without Ownership
CVE-2026-328947.1 HIGHChamilo LMS has an IDOR in Gradebook Allows Cross-Course Deletion of Any Student's Grade R
CVE-2026-337067.1 HIGHChamilo LMS has a REST API Self-Privilege Escalation (Student → Teacher)
CVE-2026-337047.1 HIGHChamilo LMS Affected by Authenticated Arbitrary File Write via BigUpload endpoint
CVE-2026-337027.1 HIGHChamilo LMS has an Insecure Direct Object Reference (IDOR)
CVE-2026-337086.5 MEDIUMChamilo LMS has REST API PII Exposure via get_user_info_from_username
CVE-2026-331416.5 MEDIUMChamilo LMS has an IDOR in REST API Stats Endpoint Exposes Any User's Learning Data
CVE-2026-337366.5 MEDIUMChamilo LMS has an Insecure Direct Object Reference (IDOR) - User Data Exposure
CVE-2026-328935.4 MEDIUMChamilo LMS has Reflected XSS via Unsanitized http_build_query() in Exercise Question List
CVE-2026-337055.3 MEDIUMChamilo LMS has unauthenticated access to Twig template source files exposes application l
CVE-2026-337375.3 MEDIUMChamilo LMS has an XML External Entity (XXE) Injection
CVE-2026-329324.7 MEDIUMChamilo LMS has an Open Redirect via Unvalidated 'page' Parameter in Session Course Edit
CVE-2025-66447Chamilo LMS has validation-less redirect on login page

Showing top 20 of 23 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-32892

No comments yet


Leave a comment