Chamilo is a learning management system. Prior to version 1.11.30, the open parameter of help.php fails to properly sanitize user input. This allows an attacker to inject arbitrary HTML, such as underlined text, via a crafted URL. This issue has been patched in version 1.11.30.
References
Configurations
History
No history.
Information
Published : 2026-03-02 16:16
Updated : 2026-03-03 18:21
NVD link : CVE-2025-52564
Mitre link : CVE-2025-52564
CVE.ORG link : CVE-2025-52564
JSON object : View
Products Affected
chamilo
- chamilo_lms
CWE
CWE-80
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
