CVE-2025-50189
Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the POST resource[document][SQLINJECTIONHERE] and POST login parameters found in /main/coursecopy/copycoursesession_selected.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.30, https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/50xxx/CVE-2025-50189.json, https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-vxx3-648j-7p4r, https://nvd.nist.gov/vuln/detail/CVE-2025-50189, https://github.com/chamilo/chamilo-lms/commit/22bb81df8f7062da20a2f6248789f47b221ca705, https://github.com/chamilo/chamilo-lms/commit/75ab03c938adc48a3cd8234d98fc340e1998aa81, https://github.com/chamilo/chamilo-lms/commit/7903cef2eb41817c11a52ba6ac34a1d454bc5ef7
