CVE-2026-33707

Published: Apr 10, 2026 Last Modified: Apr 16, 2026
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,4
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: low

Description

AI Translation Available

Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password reset mechanism generates tokens using sha1($email) with no random component, no expiration, and no rate limiting. An attacker who knows a user's email can compute the reset token and change the victim's password without authentication. This vulnerability is fixed in 1.11.38 and 2.0.0-RC.3.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0007
Percentile
0,2th
Updated

EPSS Score Trend (Last 6 Days)

640

Weak Password Recovery Mechanism for Forgotten Password

Incomplete
Common Consequences
Security Scopes Affected:
Access Control Availability Integrity Other
Potential Impacts:
Gain Privileges Or Assume Identity Dos: Resource Consumption (Other) Other
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha3:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha1:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta3:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

Version Range Affected
To 1.11.38 (exclusive)
cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha5:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta1:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha4:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc1:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Chamilo Lms by Chamilo

cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha2:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/chamilo/chamilo-lms/commit/078d7e5b77679fa7ccfcd6783bd5cc683…
https://github.com/chamilo/chamilo-lms/commit/750a45312a0d5c3ad60dbfbd0d959ca40…
https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-f27g-66gq-g7v2