CVE-2025-59542 PUBLISHED

Chamilo: Account Takeover via Stored XSS in Course Learning Paths

Assigner: GitHub_M
Reserved: 17.09.2025 Published: 06.03.2026 Updated: 06.03.2026

Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course learning path Settings field, an attacker with a low-privileged account (e.g., trainer) can execute arbitrary JavaScript code in the context of any other user viewing the course information page, including administrators. This allows an attacker to exfiltrate sensitive session cookies or tokens, resulting in account takeover (ATO) of higher-privileged users. This issue has been patched in version 1.11.34.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor chamilo
Product chamilo-lms
Versions
  • Version < 1.11.34 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE