CVE-2024-27524: Stored XSS in tickets
Overview
This advisory covers the discovery of two vulnerabilities within Chamilo LMS, an open-source learning management system (LMS) widely used across educational institutions. These vulnerabilities—stored cross-site scripting (Stored XSS) and self-cross-site scripting (Self XSS)—pose different levels of security risks but highlight critical considerations for secure system administration and user protection.
Summary of Vulnerabilities
Both vulnerabilities were responsibly disclosed, with Chamilo's development team implementing necessary patches to mitigate potential exploits. It’s advised for all users to update to Chamilo LMS version 1.11.28 or above to prevent exploitation.
Detailed Vulnerability Analysis
![]() |
Listing 1: Create a new project ticket with malicious script |
Stored XSS vulnerabilities are especially concerning, as they allow the attacker’s script to persist in the application, presenting a severe risk of data theft, session hijacking, and unauthorized redirection. Users accessing the infected area unknowingly execute the script, which could lead to potential loss of control over their accounts.
![]() |
Listing 2: Triggering the Stored XSS vulnerability |
![]() |
Listing 3: Triggering the Self XSS vulnerability through user interaction |
Final Thoughts
The discovery of these vulnerabilities underscores the importance of consistent security monitoring and collaboration within the open-source community. Working with the Chamilo team on these issues has been a reminder of the shared commitment to securing digital learning tools that empower institutions worldwide. We extend this advisory to all Chamilo users to reinforce their system’s defenses and urge proactive steps to protect the integrity of educational platforms.
Acknowledgments: Ι thank Chamilo’s development team for their swift collaboration and response, setting an example of dedication to the security of open-source software.