LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2025-50189

CVE-2025-50189 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: March 3, 2026

Chamilo - SQL Injection

Published: March 2, 2026Updated: March 3, 2026PoC AvailableRemote Exploitable

Overview

Chamilo < 1.11.30 contains a SQL injection caused by insufficient validation of POST resource[document][SQL_INJECTION_HERE] and POST login parameters in /main/coursecopy/copy_course_session_selected.php, letting attackers modify database query logic remotely, exploit requires crafted POST requests.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 5.6%(Probability of exploitation in next 30 days)

Impact

Attackers can modify database queries, potentially leading to data modification or unauthorized data access.

Mitigation

Upgrade to version 1.11.30 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 4, 2026

🟠 CVE-2025-50189 - High (8.8) Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the POST resource[document][SQL_INJECTION_HERE] and POST login parameters found in /main/courseco... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2025-50189/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2025-50189
Severity
High
CVSS Score
8.8
Type
sql_injection
Status
confirmed
EPSS
5.6%
Social Posts
1

CWE

  • CWE-89

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

5.6%Probability of exploitation in the next 30 days