Chamilo is a learning management system. Prior to version 1.11.30, there is an OS Command Injection vulnerability in /main/admin/sub_language_ajax.inc.php via the POST new_language parameter. This issue has been patched in version 1.11.30.
References
| Link | Resource |
|---|---|
| https://github.com/chamilo/chamilo-lms/commit/e1c7879d63172cd7e5e47c9a03ade0e32023e134 | Patch |
| https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.30 | Product Release Notes |
| https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-m76m-95c9-6h7r | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-02 16:16
Updated : 2026-03-03 18:44
NVD link : CVE-2025-50197
Mitre link : CVE-2025-50197
CVE.ORG link : CVE-2025-50197
JSON object : View
Products Affected
chamilo
- chamilo_lms
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
