{"id":"CVE-2025-50189","summary":"Chamilo: Error-based SQL Injection","details":"Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the POST resource[document][SQL_INJECTION_HERE] and POST login parameters found in /main/coursecopy/copy_course_session_selected.php, which allows an attacker to perform an attack aimed at modifying the database query logic by injecting an arbitrary SQL statements. This issue has been patched in version 1.11.30.","aliases":["GHSA-vxx3-648j-7p4r"],"modified":"2026-04-10T05:29:10.429343Z","published":"2026-03-02T14:49:09.061Z","database_specific":{"cwe_ids":["CWE-89"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/50xxx/CVE-2025-50189.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.30"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/50xxx/CVE-2025-50189.json"},{"type":"ADVISORY","url":"https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-vxx3-648j-7p4r"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-50189"},{"type":"FIX","url":"https://github.com/chamilo/chamilo-lms/commit/22bb81df8f7062da20a2f6248789f47b221ca705"},{"type":"FIX","url":"https://github.com/chamilo/chamilo-lms/commit/75ab03c938adc48a3cd8234d98fc340e1998aa81"},{"type":"FIX","url":"https://github.com/chamilo/chamilo-lms/commit/7903cef2eb41817c11a52ba6ac34a1d454bc5ef7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/chamilo/chamilo-lms","events":[{"introduced":"0"},{"fixed":"f748d50e9e6f3d9262a7f9f7d76447d433c64170"}]}],"versions":["CHAMILO_1_8_7_ALPHA_1","CHAMILO_1_8_7_ALPHA_2","CHAMILO_1_8_7_RC2","CHAMILO_1_8_7_RC_1","CHAMILO_1_8_7_STABLE","CHAMILO_1_8_7_STABLE_BIS","CHAMILO_1_8_8.3_STABLE_4","CHAMILO_1_8_8_2_RC_1","CHAMILO_1_8_8_2_STABLE","CHAMILO_1_8_8_2_STABLE_2","CHAMILO_1_8_8_4_STABLE","CHAMILO_1_8_8_ALPHA","CHAMILO_1_8_8_BETA_1","CHAMILO_1_8_8_BETA_2","CHAMILO_1_9_0_ALPHA_1","CHAMILO_1_9_0_ALPHA_2","CHAMILO_1_9_0_ALPHA_4","CHAMILO_1_9_0_PRE_ALPHA","CHAMILO_1_9_0_RC_1","CHAMILO_1_9_0_STABLE_2","CHAMILO_1_9_0_STABLE_3","CHAMILO_1_9_2_STABLE","CHAMILO_1_9_2_STABLE_QUARTER","CHAMILO_1_9_4_ALPHA_1","CHAMILO_1_9_4_RC_1","CHAMILO_1_9_4_STABLE","CHAMILO_1_9_6_RC_1","CHAMILO_1_9_6_RC_2","CHAMILO_1_9_6_STABLE","v1.11.10","v1.11.12","v1.11.14","v1.11.14-beta.1","v1.11.18","v1.11.20","v1.11.20-beta.1","v1.11.22","v1.11.22-beta.1","v1.11.22-beta.2","v1.11.24","v1.11.26","v1.11.26-rc.1","v1.11.28","v1.11.30-rc.1","v1.11.6","v1.11.6-alpha.1","v1.8.6.1","v1.9.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-50189.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N"}]}