CVE-2025-66447
Published:April 10, 2026
Updated:April 23, 2026
Chamilo LMS is a learning management system. From 1.11.0 to 2.0-beta.1, anyone can trigger a malicious redirect through the use of the redirect parameter to /login. This vulnerability is fixed in 2.0-beta.2.
Affected Packages
https://github.com/chamilo/chamilo-lms.git (GITHUB):
Affected version(s) =v2.0.0-RC.2 <v2.0.0-RC.2Fix Suggestion:
Update to version v2.0.0-RC.2https://github.com/chamilo/chamilo-lms.git (GITHUB):
Affected version(s) =v2.0.0-RC.3 <v2.0.0-RC.3Fix Suggestion:
Update to version v2.0.0-RC.3https://github.com/chamilo/chamilo-lms.git (GITHUB):
Affected version(s) =v2.0.0-beta.2 <v2.0.0-beta.2Fix Suggestion:
Update to version v2.0.0-beta.2https://github.com/chamilo/chamilo-lms.git (GITHUB):
Affected version(s) =v2.0.0-RC.1 <v2.0.0-RC.1Fix Suggestion:
Update to version v2.0.0-RC.1https://github.com/chamilo/chamilo-lms.git (GITHUB):
Affected version(s) =v2.0.0-beta.3 <v2.0.0-beta.3Fix Suggestion:
Update to version v2.0.0-beta.3https://github.com/chamilo/chamilo-lms.git (GITHUB):
Affected version(s) =v2.0.0 <v2.0.0Fix Suggestion:
Update to version v2.0.0https://github.com/chamilo/chamilo-lms.git (GITHUB):
Affected version(s) >=v1.11.0 <v1.11.34Fix Suggestion:
Update to version v1.11.34Related ResourcesĀ (2)
Do you need more information?
Contact UsWeakness Type (CWE)
URL Redirection to Untrusted Site ('Open Redirect')
EPSS
Base Score:
0.03