Cyber Posture

CVE-2026-33710

High

Published: 10 April 2026

Published
10 April 2026
Modified
16 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 12.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33710 is a high-severity Use of Insufficiently Random Values (CWE-330) vulnerability in Chamilo Chamilo Lms. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 mandates management of authenticators including generation with sufficient strength and randomness, directly countering the predictable MD5-based REST API key generation using insufficiently random values.

prevent

SI-2 requires timely flaw remediation, such as applying patches for CVE-2026-33710 that fix the flawed API key generation algorithm in Chamilo LMS.

detect

RA-5 supports vulnerability scanning to identify and prioritize known weaknesses like CVE-2026-33710's insufficient randomness in API keys.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated network attackers to predict and obtain valid REST API keys in a public-facing application due to insufficient randomness in key generation, directly enabling exploitation of the public-facing LMS.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, REST API keys are generated using md5(time() + (user_id * 5) - rand(10000, 10000)). The rand(10000, 10000) call always returns exactly 10000 (min == max), making the formula…

more

effectively md5(timestamp + user_id*5 - 10000). An attacker who knows a username and approximate key creation time can brute-force the API key. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.

Deeper analysisAI

CVE-2026-33710 is a vulnerability in Chamilo LMS, an open-source learning management system, affecting versions prior to 1.11.38 and 2.0.0-RC.3. The issue stems from flawed REST API key generation, where keys are produced using the MD5 hash of time() + (user_id * 5) - rand(10000, 10000). The rand() function with identical min and max parameters always returns exactly 10000, reducing the formula to a predictable md5(timestamp + user_id*5 - 10000). This weakness aligns with CWE-330: Use of Insufficiently Random Values and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

An unauthenticated attacker with network access can exploit this vulnerability if they know a target username and the approximate key creation timestamp. By brute-forcing a narrow range of timestamps combined with the known user_id, they can compute the exact API key, enabling unauthorized access to REST API endpoints and potentially exposing sensitive learning management data.

The vulnerability is addressed in Chamilo LMS versions 1.11.38 and 2.0.0-RC.3. Patches are detailed in GitHub commits 4448701bb8ec557e94ef02d19c72cbe9c49c2d09 and e7400dd840586ae134b286d0a2374f3d269a9a9d, with further guidance in the security advisory at GHSA-rpmg-j327-mr39. Administrators should upgrade to a fixed version to mitigate the risk.

Details

CWE(s)

Affected Products

chamilo
chamilo lms
2.0.0 · ≤ 1.11.38

CVEs Like This One

CVE-2025-50192Same product: Chamilo Chamilo Lms
CVE-2025-52469Same product: Chamilo Chamilo Lms
CVE-2025-50190Same product: Chamilo Chamilo Lms
CVE-2025-50188Same product: Chamilo Chamilo Lms
CVE-2026-33618Same product: Chamilo Chamilo Lms
CVE-2025-52998Same product: Chamilo Chamilo Lms
CVE-2025-50187Same product: Chamilo Chamilo Lms
CVE-2026-33714Same product: Chamilo Chamilo Lms
CVE-2025-50194Same product: Chamilo Chamilo Lms
CVE-2025-50195Same product: Chamilo Chamilo Lms

References