Home

Description

Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitrary file upload vulnerability in the H5P Import feature allows authenticated users with Teacher role to achieve Remote Code Execution (RCE). The H5P package validation only checks if h5p.json exists but doesn't block .htaccess or PHP files with alternative extensions. An attacker uploads a crafted H5P package containing a webshell and .htaccess that enables PHP execution for .txt files, bypassing security control. This issue has been patched in version 1.11.36.

PUBLISHED Reserved 2026-03-06 | Published 2026-03-16 | Updated 2026-03-16 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 1.11.36
affected

References

github.com/...lo-lms/security/advisories/GHSA-mj4f-8fw2-hrfm

github.com/chamilo/chamilo-lms/releases/tag/v1.11.36

cve.org (CVE-2026-30875)

nvd.nist.gov (CVE-2026-30875)

Download JSON