Description
A remote code execution (RCE) vulnerability in course_intro_pdf_import.php of Chamilo LMS v1.11.x allows authenticated attackers to execute arbitrary code via a crafted .htaccess file.
References (4)
Core 4
Core References
Exploit, Patch, Third Party Advisory x_refsource_misc
https://github.com/andrejspuler/writeups/tree/main/chamilo-lms#authenticated-remote-code-execution-in-import-file
Patch, Vendor Advisory x_refsource_misc
https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-66-2021-05-21-High-impact-very-low-risk-Authenticated-RCE-in-accessory-script
Patch, Third Party Advisory x_refsource_misc
https://github.com/chamilo/chamilo-lms/commit/2e5c004b57d551678a1815500ef91524ba7bb757
Patch, Third Party Advisory x_refsource_misc
https://github.com/chamilo/chamilo-lms/commit/905a21037ebc9bc5369f0fb380177cb56f496f5c
Scores
CVSS v3
8.8
EPSS
0.0324
EPSS Percentile
87.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-862
Status
published
Products (1)
chamilo/chamilo_lms
1.11.0 - 1.11.16
Published
Dec 03, 2021
Tracked Since
Feb 18, 2026