{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-59543","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-09-17T17:04:20.374Z","datePublished":"2026-03-06T03:32:06.116Z","dateUpdated":"2026-03-09T15:30:07.493Z"},"containers":{"cna":{"title":"Chamilo: Account Takeover via Stored XSS in Course Description","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-p32q-6gh3-3gcv","tags":["x_refsource_CONFIRM"],"url":"https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-p32q-6gh3-3gcv"},{"name":"https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.34","tags":["x_refsource_MISC"],"url":"https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.34"}],"affected":[{"vendor":"chamilo","product":"chamilo-lms","versions":[{"version":"< 1.11.34","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-06T03:32:06.116Z"},"descriptions":[{"lang":"en","value":"Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course description field, an attacker with a low-privileged account (e.g., trainer) can execute arbitrary JavaScript code in the context of any other user viewing the course information page, including administrators. This allows an attacker to exfiltrate sensitive session cookies or tokens, resulting in account takeover (ATO) of higher-privileged users. This issue has been patched in version 1.11.34."}],"source":{"advisory":"GHSA-p32q-6gh3-3gcv","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-09T15:29:57.076134Z","id":"CVE-2025-59543","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-09T15:30:07.493Z"}}]}}