<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Lms — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/lms/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/lms/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chamilo LMS Weak Password Reset Vulnerability (CVE-2026-33707)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-lms-weak-password-reset/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-lms-weak-password-reset/</guid><description>Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to a weak password reset mechanism, allowing attackers to compute password reset tokens using only a user's email address due to the use of SHA1 hashing without randomization, expiration, or rate limiting, leading to unauthorized account takeover.</description><content:encoded><![CDATA[<p>Chamilo LMS, a widely used learning management system, is susceptible to a critical vulnerability (CVE-2026-33707) affecting versions prior to 1.11.38 and 2.0.0-RC.3. The vulnerability lies within the default password reset mechanism, which generates password reset tokens by applying SHA1 hashing directly to user email addresses. This flawed process lacks essential security measures, including the addition of random salts, token expiration, and rate limiting. An attacker who obtains a target user&rsquo;s email address can calculate the password reset token and gain unauthorized access to the user&rsquo;s account, bypassing authentication controls. The vulnerability was publicly disclosed in April 2026 and patched in versions 1.11.38 and 2.0.0-RC.3. Organizations using vulnerable versions of Chamilo LMS are at high risk of account compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a valid email address associated with a Chamilo LMS user. This information may be obtained through OSINT or data breaches.</li>
<li>The attacker navigates to the password reset page of the Chamilo LMS instance.</li>
<li>The attacker enters the victim&rsquo;s email address into the password reset form.</li>
<li>The system generates a password reset token by applying SHA1 to the victim&rsquo;s email address without any salt or random component.</li>
<li>The attacker computes the SHA1 hash of the victim&rsquo;s email address offline.</li>
<li>The attacker uses the computed SHA1 hash as the password reset token in a crafted request to the password reset confirmation endpoint.</li>
<li>The Chamilo LMS instance validates the attacker-supplied token against the SHA1 hash of the email.</li>
<li>The attacker sets a new password for the victim&rsquo;s account and gains full access to the compromised account.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33707 allows an attacker to take complete control of user accounts within the Chamilo LMS platform. This can lead to data breaches, modification of course content, disruption of educational activities, and potential reputational damage for the affected institution. The lack of rate limiting on password reset requests can allow for automated account takeover attempts affecting many users. Given the widespread use of Chamilo LMS in educational institutions and organizations globally, the potential impact is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Chamilo LMS installations to version 1.11.38 or 2.0.0-RC.3 to remediate CVE-2026-33707.</li>
<li>Implement rate limiting on password reset requests to mitigate automated attacks attempting to exploit this vulnerability (reference: Overview section).</li>
<li>Deploy the Sigma rules below to detect attempts to exploit this vulnerability by monitoring password reset requests (reference: rules section).</li>
<li>Monitor web server logs for suspicious password reset requests originating from unusual IPs or with unusually high frequency (reference: rules logsource).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2026-33707</category><category>chamilo</category><category>lms</category><category>password-reset</category><category>credential-access</category></item><item><title>Chamilo LMS SSRF Vulnerability in Social Wall Feature</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-ssrf/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-ssrf/</guid><description>A Server-Side Request Forgery (SSRF) vulnerability exists in Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3, allowing authenticated attackers to make arbitrary HTTP requests, scan internal ports, and access cloud instance metadata via the Social Wall feature.</description><content:encoded><![CDATA[<p>Chamilo LMS, a learning management system, is vulnerable to Server-Side Request Forgery (SSRF) in versions prior to 1.11.38 and 2.0.0-RC.3. This vulnerability resides in the Social Wall feature, specifically the <code>read_url_with_open_graph</code> endpoint. By supplying a crafted URL via the <code>social_wall_new_msg_main</code> POST parameter, an authenticated attacker can force the Chamilo LMS server to make arbitrary HTTP requests. This SSRF can be leveraged to probe internal services, perform port scanning on the internal network, and potentially access sensitive cloud instance metadata. The vulnerability was patched in versions 1.11.38 and 2.0.0-RC.3. Defenders should prioritize patching and monitoring for suspicious outbound HTTP requests originating from the Chamilo LMS server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Chamilo LMS platform with valid user credentials.</li>
<li>The attacker crafts a malicious URL targeting an internal service or resource.</li>
<li>The attacker initiates a POST request to the <code>read_url_with_open_graph</code> endpoint.</li>
<li>The POST request includes the crafted URL within the <code>social_wall_new_msg_main</code> parameter.</li>
<li>The Chamilo LMS server, without proper validation, processes the POST request.</li>
<li>The server then makes an HTTP request to the attacker-supplied URL.</li>
<li>If the URL targets an internal service, the attacker may gain unauthorized access or information.</li>
<li>Successful exploitation allows the attacker to scan internal ports and potentially access cloud instance metadata, leading to further reconnaissance or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability could allow an attacker to gain unauthorized access to internal services and data within the organization&rsquo;s network. An attacker could use this vulnerability to enumerate internal systems, gather sensitive information, and potentially escalate privileges within the network. This could also lead to lateral movement, data exfiltration, or other malicious activities. The severity of the impact depends on the sensitivity of the internal services exposed and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-31941.</li>
<li>Implement network segmentation to limit the impact of potential SSRF attacks.</li>
<li>Monitor web server logs for POST requests to <code>/main/social/social_wall/social_wall.ajax.php</code> with unusual URLs in the <code>social_wall_new_msg_main</code> parameter to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule to detect requests with unusual URLs to <code>social_wall.ajax.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chamilo</category><category>ssrf</category><category>cve-2026-31941</category><category>lms</category></item><item><title>Chamilo LMS Insecure Direct Object Reference Vulnerability (CVE-2026-32930)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-idor/</link><pubDate>Fri, 10 Apr 2026 18:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-idor/</guid><description>An Insecure Direct Object Reference (IDOR) vulnerability in Chamilo LMS (CVE-2026-32930) allows authenticated teachers to modify gradebook evaluation settings of other courses by manipulating the 'editeval' GET parameter, leading to unauthorized data modification.</description><content:encoded><![CDATA[<p>Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability, identified as CVE-2026-32930. This flaw exists in the gradebook evaluation edit page. An authenticated teacher can exploit this vulnerability to view and modify the settings (name, max score, weight) of evaluations belonging to other courses. This is achieved by manipulating the <code>editeval</code> GET parameter. Successful exploitation allows unauthorized modification of gradebook settings, potentially affecting student grades and overall course integrity. The vulnerability was patched in versions 1.11.38 and 2.0.0-RC.3. This affects any Chamilo LMS instance running a vulnerable version accessible to authenticated users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to Chamilo LMS as a teacher.</li>
<li>The attacker navigates to the gradebook section of a course they have access to.</li>
<li>The attacker identifies the URL used to edit an evaluation, noting the <code>editeval</code> parameter and its associated value.</li>
<li>The attacker modifies the <code>editeval</code> parameter value to reference an evaluation ID from a different course.</li>
<li>The attacker submits the modified request to the Chamilo LMS server.</li>
<li>The server, due to the IDOR vulnerability, processes the request without proper authorization checks.</li>
<li>The attacker is able to view and modify the settings (name, max score, weight) of the evaluation belonging to the other course.</li>
<li>The attacker saves the changes, which are then reflected in the gradebook of the targeted course.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of CVE-2026-32930 can lead to unauthorized modification of gradebook evaluation settings. This could result in inaccurate grades, unfair assessment of students, and overall compromise of the learning environment&rsquo;s integrity. Given that Chamilo LMS is used by educational institutions worldwide, a successful attack could affect a large number of students and teachers. The unauthorized changes could disrupt the educational process and erode trust in the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or 2.0.0-RC.3 or later to patch CVE-2026-32930, as indicated in the overview.</li>
<li>Deploy the Sigma rule <code>Detect Chamilo Gradebook Edit Request</code> to identify attempts to exploit this IDOR vulnerability by monitoring for suspicious <code>editeval</code> parameter modifications.</li>
<li>Review web server logs for requests containing the <code>editeval</code> parameter where the associated value appears out of sequence with the user&rsquo;s course access, related to the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>idor</category><category>chamilo</category><category>lms</category><category>cve-2026-32930</category></item></channel></rss>