CVE-2026-33618

HIGH

Chamilo LMS Affected by Remote Code Execution via eval() in Platform Settings

Title source: cna

Description

Chamilo LMS is a learning management system. Prior to .0.0-RC.3, the PlatformConfigurationController::decodeSettingArray() method uses PHP's eval() to parse platform settings from the database. An attacker with admin access (obtainable via Advisory 1) can inject arbitrary PHP code into the settings, which is then executed when any user (including unauthenticated) requests /platform-config/list. This vulnerability is fixed in 2.0.0-RC.3.

Scores

CVSS v3 8.8
EPSS 0.0006
EPSS Percentile 17.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-95
Status published
Products (2)
chamilo/chamilo-lms >= 2.0.0-alpha.1, < 2.0.0-RC.3
chamilo/chamilo_lms 2.0.0 alpha1 (10 CPE variants)
Published Apr 10, 2026
Tracked Since Apr 11, 2026