CVE-2025-52564 PUBLISHED

Chamilo: HTML injection via open parameter

Assigner: GitHub_M
Reserved: 18.06.2025 Published: 02.03.2026 Updated: 02.03.2026

Chamilo is a learning management system. Prior to version 1.11.30, the open parameter of help.php fails to properly sanitize user input. This allows an attacker to inject arbitrary HTML, such as underlined text, via a crafted URL. This issue has been patched in version 1.11.30.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor chamilo
Product chamilo-lms
Versions
  • Version < 1.11.30 is affected

References

Problem Types

  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) CWE