CVE-2026-33707
moderate-risk
Published 2026-04-10
Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's email can compute the reset token and change the victim's password without authentication. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.
Do I need to act?
-
0.08% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.4/10
Critical
NETWORK
/ LOW complexity
Affected Products (11)
Affected Vendors
47
/ 100
moderate-risk
Severity
31/34 · Critical
Exploitability
0/34 · Minimal
Exposure
16/34 · Moderate