CVE-2025-50187

Chamilo · Chamilo LMS

Chamilo LMS is vulnerable to Remote Code Execution via an unvetted SOAP request parameter, allowing unauthenticated attackers to execute arbitrary commands on the host server.

Executive summary

Chamilo LMS versions prior to 1.11.28 are vulnerable to unauthenticated Remote Code Execution (RCE) via a SOAP request, posing a critical threat to server integrity.

Vulnerability

The vulnerability exists due to the improper evaluation of parameters within SOAP requests. An unauthenticated remote attacker can submit a specially crafted SOAP payload that the application evaluates without sufficient filtering, leading to arbitrary code execution.

Business impact

The ability to execute remote code allows an attacker to compromise the underlying server, access the database, and potentially pivot into the internal network. With a CVSS score of 9.8, the impact is catastrophic, involving the potential loss of all student and institutional data and total system downtime.

Remediation

Immediate Action: Upgrade Chamilo LMS to version 1.11.28 or higher immediately to address the insecure parameter evaluation in the SOAP interface.

Proactive Monitoring: Monitor server logs for unusual SOAP requests or unexpected outbound network connections from the LMS web server, which may indicate a successful compromise.

Compensating Controls: Restrict access to the SOAP API endpoints at the network level or via a WAF to only allow traffic from trusted, known IP addresses.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The severity of an unauthenticated RCE cannot be overstated. IT administrators should prioritize the deployment of version 1.11.28 and verify that all SOAP-related endpoints are properly secured or restricted to minimize the attack surface.