Input Validation Flaw in Chamilo Learning Management System
CVE-2025-52468

8.8HIGH

Key Information:

Vendor

Chamilo

Vendor
CVE Published:
2 March 2026

What is CVE-2025-52468?

Chamilo, a popular learning management system, is impacted by an input validation issue that arises during the importing of user data from CSV files. Specifically, this vulnerability affects the 'Last Name', 'First Name', and 'Username' fields due to inadequate sanitization of user inputs. Attackers can exploit this flaw to inject a stored cross-site scripting (XSS) payload, which is executed when a user profile is viewed, potentially allowing malicious scripts to run in the context of authenticated users. The issue has been resolved in version 1.11.30.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

chamilo-lms < 1.11.30

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.