Vulnerability Description
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's email can compute the reset token and change the victim's password without authentication. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chamilo | Chamilo Lms | < 1.11.38 |
Related Weaknesses (CWE)
References
- https://github.com/chamilo/chamilo-lms/commit/078d7e5b77679fa7ccfcd6783bd5cc683dPatch
- https://github.com/chamilo/chamilo-lms/commit/750a45312a0d5c3ad60dbfbd0d959ca40bPatch
- https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-f27g-66gq-g7v2Vendor Advisory
FAQ
What is CVE-2026-33707?
CVE-2026-33707 is a vulnerability with a CVSS score of 9.4 (CRITICAL). Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no r...
How severe is CVE-2026-33707?
CVE-2026-33707 has been rated CRITICAL with a CVSS base score of 9.4/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-33707?
Check the references section above for vendor advisories and patch information. Affected products include: Chamilo Chamilo Lms.