CVE-2025-52469
Logic Vulnerability in Chamilo Social Module Enables Unauthorized Friend Addition
Publication date: 2026-03-02
Last updated on: 2026-03-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| chamilo | chamilo_lms | to 1.11.30 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-841 | The product supports a session in which more than one behavior must be performed by an actor, but it does not properly ensure that the actor performs the behaviors in the required sequence. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2025-52469 is a logic vulnerability in the Chamilo learning management system's social network module prior to version 1.11.30. It allows any authenticated user to forcibly add any other user as a friend by directly calling an AJAX endpoint, bypassing the normal friend request and acceptance workflow."}, {'type': 'paragraph', 'content': 'The vulnerable endpoint does not validate whether a friend request was actually sent or accepted, nor does it verify if the target user exists. This means an attacker can add users who never sent or accepted friend requests, or even non-existent users, to their friend list without approval.'}, {'type': 'paragraph', 'content': 'This breaks access control and social interaction logic, potentially leading to privacy violations and trust boundary breaches within the social network module.'}] [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized friend additions that bypass the normal social workflow, which can lead to privacy violations by exposing friend-only content to unauthorized users.
It can also compromise data integrity by polluting friend lists with forged entries and breach trust boundaries, potentially enabling social engineering or impersonation attacks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unauthorized or suspicious AJAX requests to the vulnerable endpoint that forcibly add friends without following the normal workflow.'}, {'type': 'paragraph', 'content': 'Specifically, look for GET requests to the endpoint: /main/inc/ajax/social.ajax.php?a=add_friend&friend_id=...&is_my_friend=friend where the friend_id parameter is used to add friends.'}, {'type': 'paragraph', 'content': 'An attacker with a valid session cookie (ch_sid) can craft such requests to add arbitrary users or even non-existent users as friends.'}, {'type': 'list_item', 'content': 'Use network monitoring tools (e.g., tcpdump, Wireshark) to capture HTTP GET requests matching the pattern above.'}, {'type': 'list_item', 'content': 'On the server, check web server logs for suspicious GET requests to social.ajax.php with the add_friend action and unusual friend_id values.'}, {'type': 'list_item', 'content': "Example command to search logs for suspicious requests: grep 'social.ajax.php?a=add_friend' /var/log/apache2/access.log"}, {'type': 'list_item', 'content': "Example curl command to test the vulnerability (requires valid session cookie): curl -b 'ch_sid=YOUR_SESSION_COOKIE' 'http://targetsite/main/inc/ajax/social.ajax.php?a=add_friend&friend_id=1&is_my_friend=friend'"}] [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Chamilo LMS to version 1.11.30 or later, where this vulnerability has been patched.
The patch enforces validation to ensure that friend relationships are only established if a valid pending invitation exists, preventing unauthorized friend additions.
If upgrading immediately is not possible, consider restricting access to the vulnerable AJAX endpoint or implementing additional access controls to prevent unauthorized friend additions.
Monitor logs for suspicious activity and revoke or reset session cookies if unauthorized friend additions are detected.