Description

Chamilo is an open-source learning management system (LMS). Version 2.0.0-RC.2 contains a SQL Injection vulnerability in the statistics AJAX endpoint, which is an incomplete fix for CVE-2026-30881. While CVE-2026-30881 was patched by applying Security::remove_XSS() to the date_start and date_end parameters in the get_user_registration_by_month action, the same parameters remain unsanitized in the users_active action within the same file (public/main/inc/ajax/statistics.ajax.php), where they are directly interpolated into a SQL query. An authenticated admin can exploit this to perform time-based blind SQL injection, enabling extraction of arbitrary data from the database. This issue has been fixed in version 2.0.0.

INFO

Published Date :

2026-04-14T21:00:19.259Z

Last Modified :

2026-04-15T20:03:16.195Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-33714 vulnerability.

Vendors Products
Chamilo
  • Chamilo Lms
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33714.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability