CVE-2025-50187
Chamilo · Chamilo LMS
Chamilo LMS is vulnerable to Remote Code Execution via an unvetted SOAP request parameter, allowing unauthenticated attackers to execute arbitrary commands on the host server.
Executive summary
Chamilo LMS versions prior to 1.11.28 are vulnerable to unauthenticated Remote Code Execution (RCE) via a SOAP request, posing a critical threat to server integrity.
Vulnerability
The vulnerability exists due to the improper evaluation of parameters within SOAP requests. An unauthenticated remote attacker can submit a specially crafted SOAP payload that the application evaluates without sufficient filtering, leading to arbitrary code execution.
Business impact
The ability to execute remote code allows an attacker to compromise the underlying server, access the database, and potentially pivot into the internal network. With a CVSS score of 9.8, the impact is catastrophic, involving the potential loss of all student and institutional data and total system downtime.
Remediation
Immediate Action: Upgrade Chamilo LMS to version 1.11.28 or higher immediately to address the insecure parameter evaluation in the SOAP interface.
Proactive Monitoring: Monitor server logs for unusual SOAP requests or unexpected outbound network connections from the LMS web server, which may indicate a successful compromise.
Compensating Controls: Restrict access to the SOAP API endpoints at the network level or via a WAF to only allow traffic from trusted, known IP addresses.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The severity of an unauthenticated RCE cannot be overstated. IT administrators should prioritize the deployment of version 1.11.28 and verify that all SOAP-related endpoints are properly secured or restricted to minimize the attack surface.