CVE-2025-59544
Received Received - Intake
Authorization Bypass in Chamilo Allows Unauthorized Category Updates

Publication date: 2026-03-06

Last updated on: 2026-03-09

Assigner: GitHub, Inc.

Description
Chamilo is a learning management system. Prior to version 1.11.34, the functionality for the user to update the category does not implement authorization checks for the "category_id" parameter which allows users to update the category of any user by replacing the "category_id" parameter. This issue has been patched in version 1.11.34.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-06
Last Modified
2026-03-09
Generated
2026-05-07
AI Q&A
2026-03-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
chamilo chamilo_lms to 1.11.34 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2025-59544 is a high-severity vulnerability in Chamilo LMS versions up to and including 1.11.32. The vulnerability occurs because the application allows users to update the "category_id" parameter without performing any authorization checks. This means that any user can change the category of any other user by manipulating this parameter.'}, {'type': 'paragraph', 'content': 'The root cause is a missing authorization check (CWE-862), where the system fails to verify if the user is authorized to perform the update action on the category_id. Attackers can exploit this by brute forcing the category_id values to update categories across multiple users.'}, {'type': 'paragraph', 'content': 'This issue was fixed in Chamilo LMS version 1.11.34 by adding proper server-side authorization checks on the category_id parameter.'}] [1]


How can this vulnerability impact me? :

This vulnerability allows an attacker to change the category of any user in the Chamilo LMS without proper authorization. This can lead to unauthorized modifications of user data and potentially disrupt user management or access controls within the system.

Because the vulnerability can be exploited via brute force attacks on the category_id parameter, an attacker could systematically alter categories for many users, which might cause confusion, misclassification, or unauthorized access to resources tied to user categories.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring and testing the endpoint that handles updates to the "category_id" parameter in Chamilo LMS versions up to 1.11.32. Since the issue allows unauthorized users to modify the category of any user by manipulating the numeric "category_id" parameter, detection involves attempting to update categories for users without proper authorization.'}, {'type': 'paragraph', 'content': 'A practical approach is to perform controlled brute force or fuzzing attacks on the update endpoint by sending requests with different "category_id" values to check if unauthorized updates are accepted.'}, {'type': 'paragraph', 'content': 'Example commands using curl to test the vulnerability might look like this (replace URL and parameters accordingly):'}, {'type': 'list_item', 'content': 'curl -X POST https://your-chamilo-instance/api/updateCategory -d "user_id=target_user&category_id=some_category"'}, {'type': 'list_item', 'content': 'Repeat the above command with different "category_id" values to see if unauthorized changes are accepted.'}, {'type': 'paragraph', 'content': 'Monitoring logs for unexpected category changes or unauthorized access attempts can also help detect exploitation attempts.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The immediate mitigation step is to upgrade Chamilo LMS to version 1.11.34 or later, where the vulnerability has been patched by implementing proper server-side authorization checks on the "category_id" parameter.'}, {'type': 'paragraph', 'content': 'If upgrading immediately is not possible, restrict access to the affected endpoint to trusted users only, and monitor for suspicious activity related to category updates.'}, {'type': 'paragraph', 'content': 'Additionally, review and tighten authorization controls around user category updates to prevent unauthorized modifications.'}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart