{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T14:59:42.065","vulnerabilities":[{"cve":{"id":"CVE-2025-52470","sourceIdentifier":"security-advisories@github.com","published":"2026-03-02T16:16:21.493","lastModified":"2026-03-03T18:23:03.100","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Chamilo is a learning management system. Prior to version 1.11.30, a stored cross-site scripting (XSS) vulnerability exists in the session_category_add.php script. The vulnerability is caused by improper sanitization of the Category Name field, allowing privileged users to inject persistent JavaScript payloads. The injected script is later executed when accessing add_many_sessions_to_category.php, potentially compromising administrative sessions. This issue has been patched in version 1.11.30."},{"lang":"es","value":"Chamilo es un sistema de gestión del aprendizaje. Antes de la versión 1.11.30, existe una vulnerabilidad de cross-site scripting (XSS) almacenado en el script session_category_add.php. La vulnerabilidad es causada por una sanitización inadecuada del campo Category Name, permitiendo a usuarios privilegiados inyectar cargas útiles persistentes de JavaScript. El script inyectado se ejecuta posteriormente al acceder a add_many_sessions_to_category.php, comprometiendo potencialmente sesiones administrativas. Este problema ha sido parcheado en la versión 1.11.30."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*","versionEndExcluding":"1.11.30","matchCriteriaId":"A3963F8D-F787-4A44-90A3-9F26F9E480AA"}]}]}],"references":[{"url":"https://github.com/chamilo/chamilo-lms/commit/ead79db4eb034b8c11a3d6036759d083de37530c","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.30","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-p4m6-gwhg-x89f","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}