CVE-2025-50199
Published: 02 March 2026
Summary
CVE-2025-50199 is a critical-severity SSRF (CWE-918) vulnerability in Chamilo Chamilo Lms. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the SSRF vulnerability by requiring timely remediation through application of the vendor patch in Chamilo version 1.11.30.
Prevents blind SSRF exploitation by validating the openid_url POST parameter against allowed schemes, hosts, and paths before initiating server-side requests.
Mitigates SSRF impact by monitoring and controlling outbound communications at system boundaries to block unauthorized access to internal services or resources.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in public-facing web app directly maps to T1190 for initial exploitation; enables metadata service access (T1522) and backend DoS via crafted requests (T1499.004).
NVD Description
Chamilo is a learning management system. Prior to version 1.11.30, there is a blind SSRF vulnerability in /index.php via the POST openid_url parameter. This issue has been patched in version 1.11.30.
Deeper analysisAI
Chamilo, an open-source learning management system, is affected by CVE-2025-50199, a blind Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918. The flaw exists in versions prior to 1.11.30, specifically within the /index.php endpoint through the POST openid_url parameter. This vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H), indicating critical severity due to its network accessibility, low attack complexity, and lack of required privileges or user interaction.
Unauthenticated attackers can exploit this blind SSRF over the network by sending crafted POST requests to the vulnerable endpoint. Successful exploitation allows remote attackers to induce the server to make unauthorized requests to internal or external resources, potentially leading to high-impact confidentiality violations, such as accessing internal services or metadata, and high-impact availability disruptions, including denial-of-service conditions against backend systems.
The vulnerability has been addressed in Chamilo version 1.11.30, as detailed in the official release notes and GitHub security advisory. Security practitioners should prioritize upgrading to this patched version to mitigate the issue, with further technical details available at https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.30 and https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-jv2w-m5r6-p52h.
Details
- CWE(s)