<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-33706 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33706/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33706/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-privesc/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-privesc/</guid><description>Chamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.</description><content:encoded><![CDATA[<p>CVE-2026-33706 affects Chamilo LMS, a learning management system. Prior to version 1.11.38, the vulnerability allows an authenticated user, specifically a student (status=5), with a valid REST API key, to elevate their privileges. This is achieved by exploiting the <code>update_user_from_username</code> endpoint in the REST API. By sending a crafted request, a student can modify their user status to Teacher/CourseManager (status=1). This privilege escalation grants the attacker the ability to create and manage courses, access sensitive data, and potentially disrupt the learning environment. The vulnerability has been patched in version 1.11.38, so upgrading is strongly recommended. This vulnerability highlights the importance of proper access controls and input validation in web applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains valid credentials for a student account within the Chamilo LMS.</li>
<li>Attacker generates a REST API key associated with their student account.</li>
<li>Attacker crafts a malicious HTTP POST request targeting the <code>update_user_from_username</code> endpoint.</li>
<li>The POST request includes the attacker&rsquo;s username and a modified status value (e.g., from 5 to 1) within the request body.</li>
<li>The attacker sends the crafted request to the Chamilo LMS server, authenticating with their REST API key.</li>
<li>The Chamilo LMS server, lacking proper authorization checks, updates the attacker&rsquo;s user status in the database.</li>
<li>The attacker logs out and then logs back in to the Chamilo LMS.</li>
<li>Upon re-authentication, the attacker now has Teacher/CourseManager privileges, enabling them to create and manage courses, access student data, and modify system settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33706 allows a student to gain administrative control over the Chamilo LMS platform. This can lead to unauthorized course creation, modification of student grades, data theft, and disruption of the learning environment. The number of potential victims depends on the number of Chamilo LMS instances running a vulnerable version (prior to 1.11.38). If successful, an attacker could potentially compromise the entire learning platform and its users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or later to patch CVE-2026-33706.</li>
<li>Implement strict access control policies and regularly audit user permissions to prevent unauthorized privilege escalation.</li>
<li>Monitor web server logs for suspicious POST requests to the <code>update_user_from_username</code> endpoint (see example Sigma rule below).</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts in real-time.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>web-application</category><category>CVE-2026-33706</category></item></channel></rss>