Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without canonicalization or traversal checks. This vulnerability is fixed in 1.11.38.
| Vendor | Product | Versions |
|---|---|---|
| chamilo | chamilo-lms | < 1.11.38, < 1.11.37 |
Updated severity to CRITICAL, affected versions to < 1.11.37, and marked the vulnerability as actively exploited.
Initial creation