Chamilo LMS Insecure Direct Object Reference Vulnerability (CVE-2026-32930)
An Insecure Direct Object Reference (IDOR) vulnerability in Chamilo LMS (CVE-2026-32930) allows authenticated teachers to modify gradebook evaluation settings of other courses by manipulating the 'editeval' GET parameter, leading to unauthorized data modification.
Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability, identified as CVE-2026-32930. This flaw exists in the gradebook evaluation edit page. An authenticated teacher can exploit this vulnerability to view and modify the settings (name, max score, weight) of evaluations belonging to other courses. This is achieved by manipulating the editeval GET parameter. Successful exploitation allows unauthorized modification of gradebook settings, potentially affecting student grades and overall course integrity. The vulnerability was patched in versions 1.11.38 and 2.0.0-RC.3. This affects any Chamilo LMS instance running a vulnerable version accessible to authenticated users.
Attack Chain
- An attacker authenticates to Chamilo LMS as a teacher.
- The attacker navigates to the gradebook section of a course they have access to.
- The attacker identifies the URL used to edit an evaluation, noting the
editevalparameter and its associated value. - The attacker modifies the
editevalparameter value to reference an evaluation ID from a different course. - The attacker submits the modified request to the Chamilo LMS server.
- The server, due to the IDOR vulnerability, processes the request without proper authorization checks.
- The attacker is able to view and modify the settings (name, max score, weight) of the evaluation belonging to the other course.
- The attacker saves the changes, which are then reflected in the gradebook of the targeted course.
Impact
The successful exploitation of CVE-2026-32930 can lead to unauthorized modification of gradebook evaluation settings. This could result in inaccurate grades, unfair assessment of students, and overall compromise of the learning environment’s integrity. Given that Chamilo LMS is used by educational institutions worldwide, a successful attack could affect a large number of students and teachers. The unauthorized changes could disrupt the educational process and erode trust in the system.
Recommendation
- Upgrade Chamilo LMS to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-32930, as indicated in the overview.
- Deploy the Sigma rule
Detect Chamilo Gradebook Edit Requestto identify attempts to exploit this IDOR vulnerability by monitoring for suspiciouseditevalparameter modifications. - Review web server logs for requests containing the
editevalparameter where the associated value appears out of sequence with the user’s course access, related to the Sigma rule.
Detection coverage 2
Detect Chamilo Gradebook Edit Request
mediumDetects attempts to modify gradebook evaluations in Chamilo LMS, potentially indicating an IDOR vulnerability exploitation (CVE-2026-32930).
Detect Chamilo Suspicious POST to Edit Evaluation
lowDetects POST requests to the edit_evaluation.php endpoint in Chamilo LMS, which could indicate attempts to modify evaluation settings.
Detection queries are kept inside the platform. Get full rules →