theinfosecnews

CVE-2026-32892

Published April 10, 2026 · Updated April 11, 2026

9.1CVSS
critical

What This Means

CVE-2026-32892 is a critical OS Command Injection vulnerability in Chamilo LMS, affecting versions prior to 1.11.38 and 2.0.0-RC.3. Authenticated users, particularly teachers, can exploit this vulnerability by using the move function to execute arbitrary shell commands, leading to potential server compromise. To mitigate the risk, upgrade Chamilo LMS to versions 1.11.38 or 2.0.0-RC.3 immediately.

Official Description+

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, Chamilo LMS contains an OS Command Injection vulnerability in the file move function. The move() function in fileManage.lib.php passes user-controlled path values directly into exec() shell commands without using escapeshellarg(). When a user moves a document via document.php, the move_to POST parameter — which only passes through Security::remove_XSS() (an HTML-only filter) — is concatenated directly into shell commands such as exec("mv $source $target"). By default, Chamilo allows all authenticated users to create courses (allow_users_to_create_courses = true). Any user who is a teacher in a course (including self-created courses) can move documents, making this vulnerability exploitable by any authenticated user. The attacker must first place a directory with shell metacharacters in its name on the filesystem (achievable via Course Backup Import), then move a document into that directory to trigger arbitrary command execution as the web server user (www-data). This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.

Recommended Actions

  1. Check if your systems use any of the affected products listed above.
  2. Apply vendor patches immediately if available.
  3. Monitor vendor advisories for updates and additional mitigations.
  4. Review logs for indicators of compromise related to CVE-2026-32892.