<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-31940 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-31940/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-31940/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chamilo LMS Session Fixation Vulnerability (CVE-2026-31940)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-session-fixation/</link><pubDate>Sat, 11 Apr 2026 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-session-fixation/</guid><description>Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to session fixation due to user-controlled request parameters being used to set the PHP session ID, potentially allowing attackers to hijack user sessions.</description><content:encoded><![CDATA[<p>Chamilo LMS, a learning management system, is susceptible to a session fixation vulnerability (CVE-2026-31940) in versions prior to 1.11.38 and 2.0.0-RC.3. The vulnerability stems from the application&rsquo;s handling of user-controlled request parameters in the <code>main/lp/aicc_hacp.php</code> file. Specifically, these parameters are used directly to set the PHP session ID before the global bootstrap is loaded. This allows an attacker to potentially set a predictable session ID for a user, leading to session hijacking. The vulnerability was reported and patched, with fixes available in versions 1.11.38 and 2.0.0-RC.3. This is important for defenders to address to ensure integrity and confidentiality of user sessions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious URL or form containing a specific session ID.</li>
<li>Attacker lures a victim to access the crafted URL or form.</li>
<li>The victim&rsquo;s browser sends a request to the Chamilo LMS server with the attacker-controlled session ID.</li>
<li>The Chamilo LMS application, specifically the <code>main/lp/aicc_hacp.php</code> script, uses the attacker-provided session ID to initialize the PHP session.</li>
<li>The victim authenticates to the Chamilo LMS application.</li>
<li>The attacker uses the predetermined session ID to access the victim&rsquo;s authenticated session.</li>
<li>Attacker gains unauthorized access to the victim&rsquo;s account and associated data within the Chamilo LMS.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to hijack legitimate user sessions on a Chamilo LMS instance. This could result in unauthorized access to sensitive student or instructor data, modification of course content, or other malicious activities. The impact is high, particularly for educational institutions and organizations that rely on Chamilo LMS for their online learning platforms.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-31940.</li>
<li>Monitor web server logs for suspicious requests to <code>main/lp/aicc_hacp.php</code> containing unusual session ID parameters. Use the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Implement the &ldquo;Detect Potentially Malicious Session ID Parameter&rdquo; Sigma rule to identify exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>session-fixation</category><category>web-application</category><category>cve-2026-31940</category></item></channel></rss>