Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's email can compute the reset token and change the victim's password without authentication. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.
Metrics
Affected Vendors & Products
References
History
Mon, 13 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chamilo
Chamilo chamilo Lms |
|
| Vendors & Products |
Chamilo
Chamilo chamilo Lms |
Fri, 10 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's email can compute the reset token and change the victim's password without authentication. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3. | |
| Title | Weak Password Recovery Mechanism for Forgotten Password in chamilo/chamilo-lms | |
| Weaknesses | CWE-640 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-13T16:03:17.502Z
Reserved: 2026-03-23T17:06:05.747Z
Link: CVE-2026-33707
Updated: 2026-04-13T16:03:11.382Z
Status : Undergoing Analysis
Published: 2026-04-10T19:16:23.950
Modified: 2026-04-13T15:02:06.187
Link: CVE-2026-33707
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:59:42Z