{"api_version":"1","generated_at":"2026-04-23T15:20:23+00:00","cve":"CVE-2026-34370","urls":{"html":"https://cve.report/CVE-2026-34370","api":"https://cve.report/api/cve/CVE-2026-34370.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-34370","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-34370"},"summary":{"title":"Chamilo LMS: IDOR in the Notebook Module allows an attacker to view other users' private notes","description":"Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, the notebook module contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated student to read the private course notes of any other user on the platform by manipulating the notebook_id parameter in the editnote action. The application fetches the note content using only the supplied integer ID without verifying that the requesting user owns the note, and the full title and HTML body are rendered in the edit form and returned to the attacker's browser. While ownership checks exist in the write paths (updateNote() and delete_note()), they are entirely absent from the read path (get_note_information()). This issue has been fixed in version 2.0.0-RC.3.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-14 22:16:31","updated_at":"2026-04-22 18:46:34"},"problem_types":["CWE-285","CWE-639","CWE-285 CWE-285: Improper Authorization","CWE-639 CWE-639: Authorization Bypass Through User-Controlled Key"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"6.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/chamilo/chamilo-lms/releases/tag/v2.0.0-RC.3","name":"https://github.com/chamilo/chamilo-lms/releases/tag/v2.0.0-RC.3","refsource":"security-advisories@github.com","tags":["Product","Release Notes"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-fm35-2hvw-564q","name":"https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-fm35-2hvw-564q","refsource":"security-advisories@github.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-34370","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34370","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"chamilo","product":"chamilo-lms","version":"affected < 2.0.0-RC.3","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"alpha1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"alpha2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"alpha3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"alpha4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"alpha5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"rc1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"2.0.0","cpe7":"rc2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"34370","vulnerable":"1","versionEndIncluding":"1.11.38","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"chamilo","cpe5":"chamilo_lms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"34370","cve":"CVE-2026-34370","epss":"0.000320000","percentile":"0.091300000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:15"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-34370","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-15T18:57:17.887701Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-15T20:03:07.959Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"chamilo-lms","vendor":"chamilo","versions":[{"status":"affected","version":"< 2.0.0-RC.3"}]}],"descriptions":[{"lang":"en","value":"Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, the notebook module contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated student to read the private course notes of any other user on the platform by manipulating the notebook_id parameter in the editnote action. The application fetches the note content using only the supplied integer ID without verifying that the requesting user owns the note, and the full title and HTML body are rendered in the edit form and returned to the attacker's browser. While ownership checks exist in the write paths (updateNote() and delete_note()), they are entirely absent from the read path (get_note_information()). This issue has been fixed in version 2.0.0-RC.3."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-285","description":"CWE-285: Improper Authorization","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-639","description":"CWE-639: Authorization Bypass Through User-Controlled Key","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T21:25:28.960Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-fm35-2hvw-564q","tags":["x_refsource_CONFIRM"],"url":"https://github.com/chamilo/chamilo-lms/security/advisories/GHSA-fm35-2hvw-564q"},{"name":"https://github.com/chamilo/chamilo-lms/releases/tag/v2.0.0-RC.3","tags":["x_refsource_MISC"],"url":"https://github.com/chamilo/chamilo-lms/releases/tag/v2.0.0-RC.3"}],"source":{"advisory":"GHSA-fm35-2hvw-564q","discovery":"UNKNOWN"},"title":"Chamilo LMS: IDOR in the Notebook Module allows an attacker to view other users' private notes"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-34370","datePublished":"2026-04-14T21:25:28.960Z","dateReserved":"2026-03-27T13:43:14.369Z","dateUpdated":"2026-04-15T20:03:07.959Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-14 22:16:31","lastModifiedDate":"2026-04-22 18:46:34","problem_types":["CWE-285","CWE-639","CWE-285 CWE-285: Improper Authorization","CWE-639 CWE-639: Authorization Bypass Through User-Controlled Key"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*","versionEndIncluding":"1.11.38","matchCriteriaId":"34085140-9203-4B20-9036-743718F1A4F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha1:*:*:*:*:*:*","matchCriteriaId":"4AF7661F-C1F7-4CAB-BBDF-FC5BF7F5BEB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha2:*:*:*:*:*:*","matchCriteriaId":"FE56AF71-9D53-42C6-980D-09E1C418ED87"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha3:*:*:*:*:*:*","matchCriteriaId":"01195674-9E1A-4C07-B7D3-0F0CC2E6511B"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha4:*:*:*:*:*:*","matchCriteriaId":"BAE63449-5A56-4302-A4BF-F3D19FC96A80"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:alpha5:*:*:*:*:*:*","matchCriteriaId":"A84A06F9-5AB7-4703-8153-33AC68882B95"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta1:*:*:*:*:*:*","matchCriteriaId":"B91302A3-53DE-4ED0-BAAB-FE9DA03F8242"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta2:*:*:*:*:*:*","matchCriteriaId":"46008D4A-96F7-4E04-8256-E115AAAE3383"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:beta3:*:*:*:*:*:*","matchCriteriaId":"6E2BCAFF-D44B-4E67-998A-DF855E27606B"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"D2E7D018-E4C2-45F5-8D9A-DAC947173607"},{"vulnerable":true,"criteria":"cpe:2.3:a:chamilo:chamilo_lms:2.0.0:rc2:*:*:*:*:*:*","matchCriteriaId":"DAF96697-6B6D-459D-9510-E5CEEDC2859B"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"34370","Ordinal":"1","Title":"Chamilo LMS: IDOR in the Notebook Module allows an attacker to v","CVE":"CVE-2026-34370","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"34370","Ordinal":"1","NoteData":"Chamilo LMS is an open-source learning management system. In versions prior to 2.0.0-RC.3, the notebook module contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated student to read the private course notes of any other user on the platform by manipulating the notebook_id parameter in the editnote action. The application fetches the note content using only the supplied integer ID without verifying that the requesting user owns the note, and the full title and HTML body are rendered in the edit form and returned to the attacker's browser. While ownership checks exist in the write paths (updateNote() and delete_note()), they are entirely absent from the read path (get_note_information()). This issue has been fixed in version 2.0.0-RC.3.","Type":"Description","Title":"Chamilo LMS: IDOR in the Notebook Module allows an attacker to v"}]}}}