CVE-2025-50196
Published: 02 March 2026
Summary
CVE-2025-50196 is a high-severity OS Command Injection (CWE-78) vulnerability in Chamilo Chamilo Lms. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in web app directly enables remote command execution (T1059) via exploitation of public-facing application (T1190).
NVD Description
Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /plugin/vchamilo/views/editinstance.php via the POST main_database parameter. This issue has been patched in version 1.11.30.
Deeper analysisAI
CVE-2025-50196 is an OS Command Injection vulnerability (CWE-78) affecting Chamilo, an open-source learning management system. The flaw exists in versions prior to 1.11.30, specifically within the file /plugin/vchamilo/views/editinstance.php, where the POST main_database parameter fails to properly sanitize user input, allowing arbitrary operating system commands to be executed. The vulnerability was publicly disclosed on March 2, 2026, and carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), rated as High severity.
Exploitation requires high privileges (PR:H), such as those held by administrators or other privileged users with access to the affected endpoint over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). A successful attack enables remote code execution with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U), potentially allowing full system compromise on the hosting server.
The issue has been addressed in Chamilo version 1.11.30, as detailed in the project's GitHub security advisory (GHSA-qfvp-xg47-m7m2) and release notes. Mitigation involves upgrading to the patched version, with relevant fixes implemented in commits afdbd4bb9a9ea17b7740559dd4e05aa13b16480d and e343c764493b457c82d1e85b91a3655b093767ed. Security practitioners should review access controls for the vchamilo plugin endpoint to limit exposure until patching is complete.
Details
- CWE(s)