{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T05:26:10.215","vulnerabilities":[{"cve":{"id":"CVE-2026-29041","sourceIdentifier":"security-advisories@github.com","published":"2026-03-06T04:16:08.553","lastModified":"2026-03-09T20:20:58.097","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Chamilo is a learning management system. Prior to version 1.11.34, Chamilo LMS is affected by an authenticated remote code execution vulnerability caused by improper validation of uploaded files. The application relies solely on MIME-type verification when handling file uploads and does not adequately validate file extensions or enforce safe server-side storage restrictions. As a result, an authenticated low-privileged user can upload a crafted file containing executable code and subsequently execute arbitrary commands on the server. This issue has been patched in version 1.11.34."},{"lang":"es","value":"Chamilo es un sistema de gestión del aprendizaje. Antes de la versión 1.11.34, Chamilo LMS está afectado por una vulnerabilidad de ejecución remota de código autenticada causada por una validación incorrecta de los archivos subidos. La aplicación se basa únicamente en la verificación del tipo MIME al manejar las subidas de archivos y no valida adecuadamente las extensiones de archivo ni aplica restricciones seguras de almacenamiento en el servidor. Como resultado, un usuario autenticado con bajos privilegios puede subir un archivo manipulado que contiene código ejecutable y posteriormente ejecutar comandos arbitrarios en el servidor. Este problema ha sido parcheado en la versión 1.11.34."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*","versionEndExcluding":"1.11.34","matchCriteriaId":"BF6714C4-3D58-43BF-A32C-6D436DB93E01"}]}]}],"references":[{"url":"https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.34","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-4pc3-4w2v-vwx8","source":"security-advisories@github.com","tags":["Vendor Advisory","Mitigation"]}]}}]}