<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33710 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33710/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33710/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-api-key-bruteforce/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-api-key-bruteforce/</guid><description>Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.</description><content:encoded><![CDATA[<p>Chamilo LMS, a popular learning management system, contains a vulnerability in versions prior to 1.11.38 and 2.0.0-RC.3 related to the generation of REST API keys (CVE-2026-33710). The API keys are generated using a flawed algorithm: <code>md5(time() + (user_id * 5) - rand(10000, 10000))</code>. Due to <code>rand(10000, 10000)</code> always returning 10000, the formula simplifies to <code>md5(timestamp + user_id*5 - 10000)</code>. An attacker knowing a valid username and a rough estimate of when the API key was generated can brute-force the key due to the limited entropy. This vulnerability allows unauthorized access to the Chamilo LMS REST API. The vulnerability was reported and patched in versions 1.11.38 and 2.0.0-RC.3. This poses a significant threat to educational institutions and organizations using vulnerable versions of Chamilo LMS.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target Chamilo LMS instance running a vulnerable version (prior to 1.11.38 or 2.0.0-RC.3).</li>
<li>Attacker obtains a valid username on the target Chamilo LMS instance through OSINT or credential stuffing.</li>
<li>Attacker estimates the API key creation time. This might be inferred from user activity or system logs.</li>
<li>Attacker crafts a script to generate potential API keys based on the predictable formula <code>md5(timestamp + user_id*5 - 10000)</code> using the known username and estimated timestamp.</li>
<li>The script iterates through a range of timestamps around the estimated creation time, generating corresponding MD5 hashes.</li>
<li>Attacker sends API requests with the generated API keys to the Chamilo LMS server.</li>
<li>The server validates the API key against the user.</li>
<li>Upon successful validation, the attacker gains unauthorized access to the Chamilo LMS REST API, potentially allowing them to modify course content, access user data, or perform other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33710 can lead to unauthorized access to sensitive data within the Chamilo LMS, including user information, course materials, and grades. This could result in data breaches, academic fraud, and reputational damage for affected organizations. The vulnerability affects all organizations running vulnerable versions of Chamilo LMS; the number of victims is correlated to the number of vulnerable deployments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS installations to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-33710.</li>
<li>Monitor web server logs for unusual API requests originating from unexpected IP addresses, especially those containing potentially valid API keys by deploying the provided Sigma rule.</li>
<li>Implement rate limiting on API endpoints to mitigate brute-force attempts.</li>
<li>If upgrading is not immediately feasible, consider temporarily disabling the REST API.</li>
<li>Review and audit user permissions within Chamilo LMS to minimize the impact of potential unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33710</category><category>chamilo</category><category>api-key</category><category>brute-force</category><category>webserver</category></item></channel></rss>