Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2993 articles · 110886 vulns · 36/41 feeds (7d)
← Back to list
7.2
CVE-2026-33715PATCHED
chamilo · chamilo-lms

Chamilo LMS has Unauthenticated SSRF and Open Email Relay via install.ajax.php test_mailer action

Description

Chamilo LMS is an open-source learning management system. In version 2.0-RC.2, the file public/main/inc/ajax/install.ajax.php is accessible without authentication on fully installed instances because, unlike other AJAX endpoints, it does not include the global.inc.php file that performs authentication and installation-completed checks. Its test_mailer action accepts an arbitrary Symfony Mailer DSN string from POST data and uses it to connect to an attacker-specified SMTP server, enabling Server-Side Request Forgery (SSRF) into internal networks via the SMTP protocol. An unauthenticated attacker can also abuse this to weaponize the Chamilo server as an open email relay for phishing and spam campaigns, with emails appearing to originate from the server's IP address. Additionally, error responses from failed SMTP connections may disclose information about internal network topology and running services. This issue has been fixed in version 2.0.0-RC.3.

Affected Products

VendorProductVersions
chamilochamilo-lms>= 2.0-RC.2, < 2.0-RC.3

References

  • https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-mxc9-9335-45mc(x_refsource_CONFIRM)
  • https://github.com/chamilo/chamilo-lms/releases/tag/v2.0.0-RC.3(x_refsource_MISC)

Related News (1 articles)

Tier C
VulDB7h ago
CVE-2026-33715 | Chamilo LMS up to 2.0-RC.2 AJAX Endpoint global.inc.php test_mailer missing authentication (GHSA-mxc9-9335-45mc)
→ No new info (linked only)
CVSS 3.17.2 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch available
2.0.0-RC.3
CWECWE-306, CWE-918
PublishedApr 14, 2026
Last enriched7h agov2
Trending Score29
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-34370EXP
Chamilo LMS: IDOR in the Notebook Module allows an attacker to view other users' private notes
Trending: 48
CRITICALCVE-2026-34602EXP
Chamilo LMS: IDOR in /api/course_rel_users Allows Unauthorized Enrollment of Arbitrary Users into Courses
Trending: 48
CRITICALCVE-2026-35196EXP
Chamilo LMS has OS Command Injection via export_all_certificates action
Trending: 48
CRITICALCVE-2026-33714
Chamilo LMS has Authenticated SQL Injection in statistics.ajax.php users_active action (2.0 RC2)
Trending: 29
CRITICALCVE-2026-34160
Chamilo LMS: Unauthenticated SSRF via PENS Plugin allows attacker to probe internal network and reach cloud metadata services
Trending: 29

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 14, 2026
Patch Available
Apr 14, 2026
Discovered by ZDM
Apr 14, 2026
Updated: severity, patchAvailable
Apr 14, 2026

Version History

v2
Last enriched 7h ago
v2Tier C7h ago

Updated severity to CRITICAL, patch available version to 2.0.0-RC.3, and clarified that no exploit is available.

severitypatchAvailable
via VulDB
v18h ago

Initial creation