Chamilo LMS OS Command Injection: A Session Poisoning Nightmare

Chamilo LMS OS Command Injection: A Session Poisoning Nightmare

The National Vulnerability Database (NVD) has flagged CVE-2026-35196, a critical OS Command Injection vulnerability in Chamilo LMS, an open-source learning management system. This flaw, present in versions prior to 2.0.0-RC.3, resides within the main/inc/ajax/gradebook.ajax.php endpoint, specifically in the export_all_certificates action.

According to the NVD, the issue stems from the course code (_cid) variable, which is pulled directly from the user’s session ($_SESSION['_cid']) via api_get_course_id() and then concatenated without proper sanitization or escaping into a shell_exec() command string. This is a classic command injection scenario: if an attacker can manipulate or ‘poison’ their session data to inject shell metacharacters into the _cid variable, they can achieve arbitrary command execution on the underlying server. Such a breach could grant full access to sensitive system files and credentials, allow for application and database alteration, or even enable server disruption. This serious vulnerability has been addressed in version 2.0.0-RC.3 of Chamilo LMS, earning a CVSS score of 8.8 (HIGH) and falling under CWE-78.

Related ATT&CK Techniques

🛡️ Detection Rules

5 rules · 5 SIEM formats

5 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-35196

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

5 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-35196 Command Injection Chamilo LMS versions prior to 2.0.0-RC.3
CVE-2026-35196 Command Injection main/inc/ajax/gradebook.ajax.php endpoint
CVE-2026-35196 Command Injection export_all_certificates action
CVE-2026-35196 Command Injection Unsanitized $_SESSION['_cid'] variable in shell_exec()

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs