Description
Chamilo is an open-source learning management system (LMS). Version 2.0.0-RC.2 contains a SQL Injection vulnerability in the statistics AJAX endpoint, which is an incomplete fix for CVE-2026-30881. While CVE-2026-30881 was patched by applying Security::remove_XSS() to the date_start and date_end parameters in the get_user_registration_by_month action, the same parameters remain unsanitized in the users_active action within the same file (public/main/inc/ajax/statistics.ajax.php), where they are directly interpolated into a SQL query. An authenticated admin can exploit this to perform time-based blind SQL injection, enabling extraction of arbitrary data from the database. This issue has been fixed in version 2.0.0.
INFO
Published Date :
2026-04-14T21:00:19.259Z
Last Modified :
2026-04-15T20:03:16.195Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33714 vulnerability.
| Vendors | Products |
|---|---|
| Chamilo |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33714.