CVE-2025-52469
Received Received - Intake
Logic Vulnerability in Chamilo Social Module Enables Unauthorized Friend Addition

Publication date: 2026-03-02

Last updated on: 2026-03-03

Assigner: GitHub, Inc.

Description
Chamilo is a learning management system. Prior to version 1.11.30, a logic vulnerability in the friend request workflow of Chamilo’s social network module allows an authenticated user to forcibly add any user as a friend by directly calling the AJAX endpoint. The attacker can bypass the normal flow of sending and accepting friend requests, and even add non-existent users. This breaks access control and social interaction logic, with potential privacy implications. This issue has been patched in version 1.11.30.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-02
Last Modified
2026-03-03
Generated
2026-05-07
AI Q&A
2026-03-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
chamilo chamilo_lms to 1.11.30 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-841 The product supports a session in which more than one behavior must be performed by an actor, but it does not properly ensure that the actor performs the behaviors in the required sequence.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2025-52469 is a logic vulnerability in the Chamilo learning management system's social network module prior to version 1.11.30. It allows any authenticated user to forcibly add any other user as a friend by directly calling an AJAX endpoint, bypassing the normal friend request and acceptance workflow."}, {'type': 'paragraph', 'content': 'The vulnerable endpoint does not validate whether a friend request was actually sent or accepted, nor does it verify if the target user exists. This means an attacker can add users who never sent or accepted friend requests, or even non-existent users, to their friend list without approval.'}, {'type': 'paragraph', 'content': 'This breaks access control and social interaction logic, potentially leading to privacy violations and trust boundary breaches within the social network module.'}] [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized friend additions that bypass the normal social workflow, which can lead to privacy violations by exposing friend-only content to unauthorized users.

It can also compromise data integrity by polluting friend lists with forged entries and breach trust boundaries, potentially enabling social engineering or impersonation attacks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unauthorized or suspicious AJAX requests to the vulnerable endpoint that forcibly add friends without following the normal workflow.'}, {'type': 'paragraph', 'content': 'Specifically, look for GET requests to the endpoint: /main/inc/ajax/social.ajax.php?a=add_friend&friend_id=...&is_my_friend=friend where the friend_id parameter is used to add friends.'}, {'type': 'paragraph', 'content': 'An attacker with a valid session cookie (ch_sid) can craft such requests to add arbitrary users or even non-existent users as friends.'}, {'type': 'list_item', 'content': 'Use network monitoring tools (e.g., tcpdump, Wireshark) to capture HTTP GET requests matching the pattern above.'}, {'type': 'list_item', 'content': 'On the server, check web server logs for suspicious GET requests to social.ajax.php with the add_friend action and unusual friend_id values.'}, {'type': 'list_item', 'content': "Example command to search logs for suspicious requests: grep 'social.ajax.php?a=add_friend' /var/log/apache2/access.log"}, {'type': 'list_item', 'content': "Example curl command to test the vulnerability (requires valid session cookie): curl -b 'ch_sid=YOUR_SESSION_COOKIE' 'http://targetsite/main/inc/ajax/social.ajax.php?a=add_friend&friend_id=1&is_my_friend=friend'"}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Chamilo LMS to version 1.11.30 or later, where this vulnerability has been patched.

The patch enforces validation to ensure that friend relationships are only established if a valid pending invitation exists, preventing unauthorized friend additions.

If upgrading immediately is not possible, consider restricting access to the vulnerable AJAX endpoint or implementing additional access controls to prevent unauthorized friend additions.

Monitor logs for suspicious activity and revoke or reset session cookies if unauthorized friend additions are detected.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart