Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 02 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chamilo is a learning management system. Chamillo is affected by a post-authentication phar unserialize which leads to a remote code execution (RCE) within versions 1.11.12 to 1.11.26. By abusing multiple supported features from the virtualization plugin vchamilo, the vulnerability allows an administrator to execute arbitrary code on the server. This issue has been patched in version 1.11.26. | |
| Title | Chamilo: Post-Auth Remote Code Execution | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-02T19:31:07.493Z
Reserved: 2024-10-04T16:00:09.631Z
Link: CVE-2024-47886
Updated: 2026-03-02T19:30:49.412Z
Status : Awaiting Analysis
Published: 2026-03-02T15:16:29.160
Modified: 2026-03-02T20:29:29.330
Link: CVE-2024-47886
No data.
OpenCVE Enrichment
No data.