Chamilo LMS IDOR Flaw Exposes User-Course Enrollments
The National Vulnerability Database has flagged CVE-2026-34602, a high-severity Insecure Direct Object Reference (IDOR) vulnerability impacting Chamilo LMS, an open-source learning management system. Specifically, versions prior to 2.0.0-RC.3 are susceptible via the /api/course_rel_users endpoint. This flaw allows an authenticated attacker to manipulate the user parameter in a request, enabling them to enroll any user into any course without proper authorization.
This isn’t just a minor oversight; it’s a classic IDOR where the backend blindly trusts user-supplied input without verifying if the requester actually owns or has permission to act on behalf of the referenced user ID. The implications are pretty stark: unauthorized access to course materials, bypassing enrollment controls, and a significant hit to platform integrity. Imagine someone getting access to sensitive training modules they shouldn’t even know exist. The good news is, Chamilo has addressed this in version 2.0.0-RC.3, so patching is critical.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Credential Abuse from Breached Vendor — CVE-2026-34602
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-34602 | IDOR | Chamilo LMS versions prior to 2.0.0-RC.3 |
| CVE-2026-34602 | IDOR | Vulnerable endpoint: /api/course_rel_users |
| CVE-2026-34602 | IDOR | Parameter: user in request body |