CVE-2025-59541

8.1 HIGH

📋 TL;DR

This CSRF vulnerability in Chamilo LMS allows attackers to trick authenticated trainers into deleting projects within courses without their consent. The vulnerability exists because project deletion actions lack anti-CSRF protections and use GET requests. Only authenticated trainers who can access course projects are affected.

💻 Affected Systems

Products:
  • Chamilo LMS
Versions: All versions prior to 1.11.34
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where trainers have access to course projects. Requires attacker to trick authenticated trainer into visiting malicious page.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious actors could systematically delete all projects across multiple courses, causing significant data loss and disruption to educational activities.

🟠

Likely Case

Targeted deletion of specific projects through social engineering, leading to loss of student work and course materials.

🟢

If Mitigated

No impact if proper CSRF tokens are implemented and POST requests are required for destructive actions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated trainers but uses simple CSRF techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.11.34

Vendor Advisory: https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-rpj6-p9m5-q637

Restart Required: No

Instructions:

1. Backup your Chamilo installation and database. 2. Download version 1.11.34 from the official repository. 3. Replace existing files with patched version. 4. Run database update scripts if required. 5. Verify functionality.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to project deletion endpoints and change from GET to POST requests

Web Application Firewall Rules

all

Configure WAF to block suspicious GET requests to project deletion endpoints

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies and require re-authentication for destructive actions
  • Educate trainers about CSRF risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check if Chamilo version is below 1.11.34 and inspect project deletion endpoints for missing CSRF tokens

Check Version:

Check Chamilo admin panel or inspect main/inc/conf/configuration.php for version information

Verify Fix Applied:

Verify version is 1.11.34 or higher and test that project deletion requires CSRF tokens and POST requests

📡 Detection & Monitoring

Log Indicators:

  • Multiple project deletion requests from same user in short timeframe
  • GET requests to project deletion endpoints

Network Indicators:

  • Unusual referrer headers in project deletion requests
  • Requests to project deletion without corresponding CSRF tokens

SIEM Query:

source="chamilo_logs" AND (uri="*delete_project*" OR uri="*project/delete*") AND method="GET"

🔗 References

📤 Share & Export