CVE-2025-59543

Chamilo · Chamilo LMS

Chamilo LMS prior to 1.11.34 is vulnerable to stored XSS in the course description field, enabling authenticated trainers to capture administrator session tokens.

Executive summary

Authenticated attackers can perform account takeover of Chamilo LMS administrators by exploiting a stored cross-site scripting (XSS) vulnerability in the course description field.

Vulnerability

This flaw allows an authenticated user with trainer-level access to inject malicious JavaScript into the course description field. The payload is stored and subsequently executed in the browser of any user, including high-privileged administrators, who visits the affected course information page.

Business impact

The CVSS score of 9.0 reflects the critical nature of this vulnerability, which facilitates full administrative account takeover. Compromise of an LMS can lead to the theft of sensitive personal identifiable information (PII) of students and staff, as well as the loss of intellectual property.

Remediation

Immediate Action: Upgrade Chamilo LMS to version 1.11.34 or higher immediately to ensure all course fields are properly sanitized before being rendered.

Proactive Monitoring: Scan existing course descriptions for suspicious <script> or <iframe> tags and review audit logs for any unauthorized modifications to course content.

Compensating Controls: Deploy a Web Application Firewall (WAF) with rulesets designed to detect and block common XSS patterns in POST request bodies.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Immediate patching is the only effective way to mitigate this risk. In addition to updating Chamilo, administrators should review the permissions of all users with "trainer" roles to ensure the principle of least privilege is maintained across the platform.