EUVD-2026-21559

| CVE-2026-33706 HIGH
2026-04-10 [email protected]
7.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None

Lifecycle Timeline

3
Analysis Generated
Apr 10, 2026 - 19:22 vuln.today
EUVD ID Assigned
Apr 10, 2026 - 19:22 euvd
EUVD-2026-21559
CVE Published
Apr 10, 2026 - 19:16 nvd
HIGH 7.1

Description

Chamilo LMS is a learning management system. Prior to 1.11.38, any authenticated user with a REST API key can modify their own status field via the update_user_from_username endpoint. A student (status=5) can change their status to Teacher/CourseManager (status=1), gaining course creation and management privileges. This vulnerability is fixed in 1.11.38.

Analysis

Privilege escalation in Chamilo LMS versions prior to 1.11.38 allows any authenticated user with a REST API key to elevate their account status from student (status=5) to teacher/course manager (status=1) by manipulating the status field through the update_user_from_username REST API endpoint. This enables unauthorized course creation and management capabilities. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Audit all Chamilo REST API keys currently issued and identify which users possess active credentials; disable API access for non-administrative accounts if not operationally critical. Within 7 days: Review Chamilo user roles and status values in your database for unauthorized escalations (verify no students have status=1); upgrade to Chamilo LMS 1.11.38 or later if available, or implement the vendor's recommended mitigation controls. …

Sign in for detailed remediation steps.

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: 0

Share

EUVD-2026-21559 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy