CVE-2026-33706
Received Received - Intake
Privilege Escalation in Chamilo LMS via REST API Status Modification

Publication date: 2026-04-10

Last updated on: 2026-04-16

Assigner: GitHub, Inc.

Description
Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated user with a REST API key can modify their own status field via the update_user_from_username endpoint. A student (status=5) can change their status to Teacher/CourseManager (status=1), gaining course creation and management privileges. This vulnerability is fixed in 1.11.38.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-10
Last Modified
2026-04-16
Generated
2026-05-07
AI Q&A
2026-04-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
chamilo chamilo_lms to 1.11.38 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade Chamilo LMS to version 1.11.38 or later, where this vulnerability has been fixed.

Until the upgrade can be applied, restrict access to the REST API to trusted users only and monitor API usage closely.

Consider disabling or limiting REST API keys for users who do not require them, especially students.

Review and audit user roles and statuses to detect and revert any unauthorized privilege escalations.

Implement network-level controls such as firewall rules to limit access to the Chamilo LMS REST API endpoints.


Can you explain this vulnerability to me?

CVE-2026-33706 is a security vulnerability in Chamilo LMS affecting versions prior to 1.11.38. It allows any authenticated user with a REST API key to modify their own user status via the update_user_from_username endpoint.

Specifically, a student (status=5) can change their status to Teacher/CourseManager (status=1), gaining unauthorized privileges such as course creation and management.

The vulnerability arises because the system does not properly validate or restrict modifications to sensitive user fields like status, roles, and authentication source, enabling privilege escalation.


How can this vulnerability impact me? :

This vulnerability can allow a user with lower privileges, such as a student, to escalate their privileges to that of a Teacher or CourseManager.

  • Gain unauthorized course creation and management capabilities.
  • Modify over 25 sensitive user fields including roles, authentication source, active and enabled flags.
  • Bypass intended administrative controls, breaking the trust model of the LMS.

This can lead to unauthorized access to course content, grading, and potentially manipulation of other users' data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unauthorized modification of user status via the Chamilo LMS REST API endpoint update_user_from_username by authenticated users with a REST API key.

To detect exploitation attempts on your system or network, you can monitor REST API calls to the update_user_from_username endpoint, especially those that attempt to change the 'status' field or other admin-only fields such as 'roles', 'auth_source', 'enabled', or 'active'.

  • Check web server or application logs for POST or PUT requests to the REST API endpoint containing parameters that modify user status or roles.
  • Use network monitoring tools (e.g., tcpdump, Wireshark) to filter HTTP requests targeting the update_user_from_username endpoint.
  • Example command to search logs for suspicious API calls (assuming Apache logs): grep 'update_user_from_username' /var/log/apache2/access.log | grep -E 'status=1|roles='
  • Use API auditing or logging features within Chamilo LMS if available to track changes to user status or roles.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated users to escalate their privileges by modifying their own status to gain unauthorized administrative capabilities within the Chamilo LMS platform.

Such unauthorized privilege escalation can lead to improper access control, potentially violating principles of least privilege and data protection requirements found in common standards and regulations like GDPR and HIPAA.

Specifically, unauthorized users gaining elevated roles could access, modify, or manage sensitive user data or course content, which may result in breaches of confidentiality and integrity obligations mandated by these regulations.

Therefore, this vulnerability undermines compliance with standards that require strict access controls and protection of personal and sensitive information.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart