CVE-2026-33707

moderate-risk
Published 2026-04-10

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's email can compute the reset token and change the victim's password without authentication. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.

Do I need to act?

-
0.08% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.4/10 Critical
NETWORK / LOW complexity

Affected Vendors

47
/ 100
moderate-risk
Severity 31/34 · Critical
Exploitability 0/34 · Minimal
Exposure 16/34 · Moderate