<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Chamilo-Lms — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/chamilo-lms/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/chamilo-lms/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-path-trav/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-path-trav/</guid><description>A path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.</description><content:encoded><![CDATA[<p>Chamilo LMS, a learning management system, is vulnerable to a path traversal vulnerability (CVE-2026-31939) affecting versions prior to 1.11.38. This vulnerability resides in the <code>main/exercise/savescores.php</code> script. The vulnerability arises because the application directly concatenates user-supplied input from the <code>$_REQUEST['test']</code> parameter into a filesystem path without proper sanitization, canonicalization, or traversal checks. This allows an attacker to manipulate the path and potentially delete arbitrary files on the server. Successful exploitation requires an authenticated user with access to the vulnerable functionality. Organizations using affected versions of Chamilo LMS are at risk of data loss and potential system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user accesses the <code>main/exercise/savescores.php</code> script within the Chamilo LMS application.</li>
<li>The application retrieves the value of the <code>test</code> parameter from the <code>$_REQUEST</code> array.</li>
<li>The application concatenates this user-supplied value directly into a file system path without proper sanitization or validation.</li>
<li>The application then attempts to delete the file specified by the constructed path using a function such as <code>unlink()</code>.</li>
<li>An attacker crafts a malicious <code>test</code> parameter containing path traversal sequences (e.g., <code>../../</code>) to navigate outside the intended directory.</li>
<li>The application, without proper checks, uses the manipulated path to delete a file outside of the designated exercise directory.</li>
<li>The attacker successfully deletes arbitrary files on the server, potentially including sensitive configuration files or other critical data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31939 allows an attacker to delete arbitrary files on the Chamilo LMS server. This can lead to data loss, system instability, and potential compromise of the entire system. The CVSS v3.1 score of 8.3 (HIGH) reflects the potential for significant impact, with confidentiality, integrity, and availability all being affected. The number of victims depends on the deployment size and user base of the affected Chamilo LMS instances.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or later to patch CVE-2026-31939, as indicated in the advisory <a href="https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.38">https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.38</a>.</li>
<li>Implement input validation and sanitization on all user-supplied input, especially the <code>test</code> parameter in <code>main/exercise/savescores.php</code>, to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests to <code>main/exercise/savescores.php</code> containing path traversal sequences (e.g., <code>../</code>, <code>..\\</code>), using the provided Sigma rule as a guide.</li>
<li>Implement file system access controls to limit the permissions of the web server process to only the necessary directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-deletion</category><category>chamilo-lms</category></item></channel></rss>