Chamilo LMS SSRF: Unauthenticated Attack Poses High Risk

Chamilo LMS SSRF: Unauthenticated Attack Poses High Risk

The open-source learning management system, Chamilo LMS, is grappling with a severe Server-Side Request Forgery (SSRF) vulnerability, identified as CVE-2026-34160. According to the National Vulnerability Database, versions prior to 2.0.0-RC.3 are affected. The flaw resides in the PENS (Package Exchange Notification Services) plugin, specifically at the public/plugin/Pens/pens.php endpoint.

Critically, this endpoint is accessible without any authentication. Attackers can manipulate a package-url parameter, which the server fetches using curl. The kicker? There’s no filtering for private or internal IP addresses. This oversight enables unauthenticated SSRF, allowing a threat actor to probe internal network services, potentially accessing sensitive cloud metadata endpoints like 169.254.169.254. Such access could lead to the theft of IAM credentials or other sensitive instance metadata. Furthermore, the receipt and alerts callback parameters can be leveraged to trigger state-changing operations on internal services. The fact that no authentication is required for either SSRF vector significantly broadens the attack surface, making this a prime target for initial access. The National Vulnerability Database indicates a CVSS score of 8.6 (HIGH) for this issue, which has been addressed in version 2.0.0-RC.3.

Related ATT&CK Techniques

🛡️ Detection Rules

4 rules · 5 SIEM formats

4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-34160

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-34160 SSRF Chamilo LMS versions prior to 2.0.0-RC.3
CVE-2026-34160 SSRF Vulnerable endpoint: public/plugin/Pens/pens.php
CVE-2026-34160 SSRF Vulnerable parameter: package-url
CVE-2026-34160 SSRF Attack vector: Accessing cloud metadata endpoints (e.g., 169.254.169.254)
CVE-2026-34160 SSRF Attack vector: Triggering state-changing operations via receipt and alerts callback parameters

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs