CVE-2025-55208

9.0 CRITICAL

📋 TL;DR

This vulnerability allows low-privilege users in Chamilo LMS to upload malicious files containing stored XSS payloads through the Social Networks feature. When an admin user views these files, arbitrary JavaScript executes in their browser context, potentially leading to admin account takeover. All Chamilo installations running versions before 1.11.34 are affected.

💻 Affected Systems

Products:
  • Chamilo LMS
Versions: All versions prior to 1.11.34
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Social Networks feature enabled and file upload functionality accessible to low-privilege users.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Chamilo instance through admin account takeover, leading to data theft, system manipulation, or further attacks on users.

🟠

Likely Case

Admin session hijacking leading to unauthorized access to sensitive student data, grade manipulation, or privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and file upload restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated low-privilege user access and admin interaction with malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.11.34

Vendor Advisory: https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-2vq2-826h-6hp6

Restart Required: No

Instructions:

1. Backup your Chamilo installation and database. 2. Download version 1.11.34 from the official Chamilo repository. 3. Replace affected files with patched versions. 4. Clear application cache if applicable.

🔧 Temporary Workarounds

Disable Social Networks file uploads

all

Temporarily disable file upload functionality in Social Networks feature

Modify Chamilo configuration to restrict file uploads in social.php or related modules

Implement file upload restrictions

all

Add server-side file type validation and sanitization

Configure web server to block upload of HTML/JS files
Implement Content Security Policy headers

🧯 If You Can't Patch

  • Restrict file upload permissions to trusted users only
  • Implement web application firewall rules to detect and block XSS payloads in file uploads

🔍 How to Verify

Check if Vulnerable:

Check Chamilo version in admin panel or main.php file version constant

Check Version:

grep -r "define('CHAMILO_VERSION'" /path/to/chamilo/ || php -r "include 'main/inc/global.inc.php'; echo _s('Version');"

Verify Fix Applied:

Verify version is 1.11.34 or later and test file upload functionality with XSS payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with .html/.htm/.js extensions
  • Multiple failed upload attempts with suspicious filenames
  • Admin account login from unexpected locations

Network Indicators:

  • HTTP POST requests to social network upload endpoints with script tags
  • Unusual outbound connections from admin sessions

SIEM Query:

source="web_logs" AND (uri_path="/main/social/" OR uri_path="/main/upload/") AND (file_extension="html" OR file_extension="htm" OR file_extension="js")

🔗 References

📤 Share & Export