CVE-2023-3368 — Command injection in `/main/webservices/additional_webservices
Command injection in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters. This is a bypass of CVE-2023-34960.
Published
2023-11-28T07:05:26.659Z
Last modified
2025-06-03T13:58:32.131Z
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
01What is this vulnerability?
Command injection in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters. This is a bypass of CVE-2023-34960.
02Affected products
| Vendor | Product | Versions |
|---|
| Chamilo | Chamilo | 0 |
03Active exploitation status
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
08Timeline
- Published: 2023-11-28T07:05:26.659Z
- Last modified: 2025-06-03T13:58:32.131Z
09References
- support.chamilo.org — https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-121-2…
- starlabs.sg — https://starlabs.sg/advisories/23/23-3368/
- github.com — https://github.com/chamilo/chamilo-lms/commit/37be9ce7243a30259047dd4517c48ff8b2…
- https: — https://https://github.com/chamilo/chamilo-lms/commit/4c69b294f927db62092e01b70a…
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →