CVE-2026-33704 PUBLISHED

Chamilo LMS Affected by Authenticated Arbitrary File Write via BigUpload endpoint

Assigner: GitHub_M
Reserved: 23.03.2026 Published: 10.04.2026 Updated: 10.04.2026

Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated user (including students) can write arbitrary content to files on the server via the BigUpload endpoint. The key parameter controls the filename and the raw POST body becomes the file content. While .php extensions are filtered to .phps, the .pht extension passes through unmodified. On Apache configurations where .pht is handled as PHP, this leads to Remote Code Execution. This vulnerability is fixed in 1.11.38.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
CVSS Score: 7.1

Product Status

Vendor chamilo
Product chamilo-lms
Versions
  • Version < 1.11.38 is affected

References

Problem Types

  • CWE-434: Unrestricted Upload of File with Dangerous Type CWE