<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-32930 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-32930/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 18:16:42 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-32930/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chamilo LMS Insecure Direct Object Reference Vulnerability (CVE-2026-32930)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-idor/</link><pubDate>Fri, 10 Apr 2026 18:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-idor/</guid><description>An Insecure Direct Object Reference (IDOR) vulnerability in Chamilo LMS (CVE-2026-32930) allows authenticated teachers to modify gradebook evaluation settings of other courses by manipulating the 'editeval' GET parameter, leading to unauthorized data modification.</description><content:encoded><![CDATA[<p>Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability, identified as CVE-2026-32930. This flaw exists in the gradebook evaluation edit page. An authenticated teacher can exploit this vulnerability to view and modify the settings (name, max score, weight) of evaluations belonging to other courses. This is achieved by manipulating the <code>editeval</code> GET parameter. Successful exploitation allows unauthorized modification of gradebook settings, potentially affecting student grades and overall course integrity. The vulnerability was patched in versions 1.11.38 and 2.0.0-RC.3. This affects any Chamilo LMS instance running a vulnerable version accessible to authenticated users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to Chamilo LMS as a teacher.</li>
<li>The attacker navigates to the gradebook section of a course they have access to.</li>
<li>The attacker identifies the URL used to edit an evaluation, noting the <code>editeval</code> parameter and its associated value.</li>
<li>The attacker modifies the <code>editeval</code> parameter value to reference an evaluation ID from a different course.</li>
<li>The attacker submits the modified request to the Chamilo LMS server.</li>
<li>The server, due to the IDOR vulnerability, processes the request without proper authorization checks.</li>
<li>The attacker is able to view and modify the settings (name, max score, weight) of the evaluation belonging to the other course.</li>
<li>The attacker saves the changes, which are then reflected in the gradebook of the targeted course.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of CVE-2026-32930 can lead to unauthorized modification of gradebook evaluation settings. This could result in inaccurate grades, unfair assessment of students, and overall compromise of the learning environment&rsquo;s integrity. Given that Chamilo LMS is used by educational institutions worldwide, a successful attack could affect a large number of students and teachers. The unauthorized changes could disrupt the educational process and erode trust in the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-32930, as indicated in the overview.</li>
<li>Deploy the Sigma rule <code>Detect Chamilo Gradebook Edit Request</code> to identify attempts to exploit this IDOR vulnerability by monitoring for suspicious <code>editeval</code> parameter modifications.</li>
<li>Review web server logs for requests containing the <code>editeval</code> parameter where the associated value appears out of sequence with the user&rsquo;s course access, related to the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>chamilo</category><category>lms</category><category>cve-2026-32930</category></item></channel></rss>