<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Eval-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/eval-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/eval-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chamilo LMS Unauthenticated Remote Code Execution via Configuration Injection (CVE-2026-33618)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-rce/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-rce/</guid><description>Chamilo LMS versions prior to 2.0.0-RC.3 are vulnerable to remote code execution (RCE) via eval injection, where an authenticated administrator can inject arbitrary PHP code into platform settings that is then executed when any user (including unauthenticated) requests the /platform-config/list endpoint.</description><content:encoded><![CDATA[<p>Chamilo LMS is a widely used open-source learning management system. CVE-2026-33618 affects versions prior to 2.0.0-RC.3. The vulnerability lies within the <code>PlatformConfigurationController::decodeSettingArray()</code> method, which unsafely uses PHP&rsquo;s <code>eval()</code> function to parse platform settings retrieved from the database. An attacker who has already gained administrative access to the Chamilo LMS platform can inject arbitrary PHP code into these settings. This injected code is then executed whenever <em>any</em> user, including unauthenticated users, makes a request to the <code>/platform-config/list</code> endpoint. This allows for unauthenticated remote code execution, making it a critical vulnerability for organizations using affected versions of Chamilo LMS.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains administrative access to the Chamilo LMS instance (potentially through a separate vulnerability or compromised credentials).</li>
<li>Attacker navigates to the platform configuration settings page within the Chamilo LMS admin panel.</li>
<li>Attacker injects malicious PHP code into a configurable setting field. This code is designed to execute arbitrary commands on the server.</li>
<li>The injected PHP code is saved to the Chamilo LMS database.</li>
<li>An unauthenticated user makes a request to the <code>/platform-config/list</code> endpoint.</li>
<li>The <code>PlatformConfigurationController::decodeSettingArray()</code> method is called to process the platform settings from the database.</li>
<li>The <code>eval()</code> function executes the attacker&rsquo;s injected PHP code.</li>
<li>The attacker achieves remote code execution on the Chamilo LMS server, enabling them to potentially compromise the entire system and connected networks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33618 allows an attacker to execute arbitrary PHP code on the Chamilo LMS server. This can lead to full system compromise, data exfiltration, defacement, or denial-of-service. Given that Chamilo LMS is used by educational institutions and organizations worldwide, a successful attack could impact thousands of users and expose sensitive student or employee data. The vulnerability&rsquo;s ease of exploitation, requiring only admin access and an unauthenticated request to a specific endpoint, makes it a highly attractive target for malicious actors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Chamilo LMS instances to version 2.0.0-RC.3 or later to patch CVE-2026-33618.</li>
<li>Monitor web server logs for requests to the <code>/platform-config/list</code> endpoint originating from unusual IP addresses or user agents using the Sigma rule <code>Chamilo_Suspicious_PlatformConfig_Access</code>.</li>
<li>Implement the Sigma rule <code>Chamilo_Eval_Based_Code_Execution</code> to detect potential exploitation attempts based on unusual PHP processes spawned from the web server.</li>
<li>Review and audit all Chamilo LMS administrative accounts for suspicious activity to prevent initial access to vulnerable configuration settings.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>chamilo</category><category>rce</category><category>eval-injection</category><category>cve-2026-33618</category></item></channel></rss>