Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2842 articles · 109910 vulns · 38/41 feeds (7d)
← Back to list
9.1
CVE-2026-32892EXPLOITED
chamilo · chamilo-lms

OS Command Injection in Chamilo LMS 1.11.36

Description

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an OS Command Injection vulnerability in the file move function. The move() function in fileManage.lib.php passes user-controlled path values directly into exec() shell commands without using escapeshellarg(). When a user moves a document via document.php, the move_to POST parameter — which only passes through Security::remove_XSS() (an HTML-only filter) — is concatenated directly into shell commands such as exec("mv $source $target"). By default, Chamilo allows all authenticated users to create courses (allow_users_to_create_courses = true). Any user who is a teacher in a course (including self-created courses) can move documents, making this vulnerability exploitable by any authenticated user. The attacker must first place a directory with shell metacharacters in its name on the filesystem (achievable via Course Backup Import), then move a document into that directory to trigger arbitrary command execution as the web server user (www-data). This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.

Affected Products

VendorProductVersions
chamilochamilo-lms< 1.11.38, >= 2.0.0-alpha.1, < 2.0.0-RC.3, < 1.11.37

References

  • https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-59cv-qh65-vvrr(x_refsource_CONFIRM)
  • https://github.com/chamilo/chamilo-lms/commit/3597b19b73d73d681e4fb503285e9bbfe71714bf(x_refsource_MISC)
  • https://github.com/chamilo/chamilo-lms/commit/62671e5e268f235cddfba704edee90f35c234df1(x_refsource_MISC)

Related News (1 articles)

Tier C
VulDB4h ago
CVE-2026-32892 | Chamilo LMS up to 1.11.37 POST Parameter fileManage.lib.php move Source os command injection
→ No new info (linked only)
CVSS 3.19.1 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-78
PublishedApr 10, 2026
Last enriched4h agov2
Trending Score49
Source articles1
Independent1
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-33704EXP
Chamilo LMS Affected by Authenticated Arbitrary File Write via BigUpload endpoint
Trending: 50
CRITICALCVE-2026-33706EXP
Chamilo LMS has a REST API Self-Privilege Escalation (Student → Teacher)
Trending: 50
CRITICALCVE-2026-31939EXP
Path Traversal (Arbitrary File Delete) in Chamilo LMS
Trending: 49
CRITICALCVE-2026-32931EXP
Chamilo LMS has Arbitrary File Upload via MIME-Only Validation in Exercise Sound Upload Leads to RCE
Trending: 49
CRITICALCVE-2026-32894EXP
Chamilo LMS has an IDOR in Gradebook Allows Cross-Course Deletion of Any Student's Grade Result
Trending: 49

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 10, 2026
Discovered by ZDM
Apr 10, 2026
Actively Exploited
Apr 10, 2026
Updated: affectedVersions, activelyExploited
Apr 10, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated affected versions to include < 1.11.37 and marked the vulnerability as actively exploited.

affectedVersionsactivelyExploited
via VulDB
v14h ago

Initial creation