{"id":"CVE-2021-34187","details":"main/inc/ajax/model.ajax.php in Chamilo through 1.11.14 allows SQL Injection via the searchField, filters, or filters2 parameter.","modified":"2026-05-16T04:03:05.966146943Z","published":"2021-06-28T16:15:08.700Z","database_specific":{},"references":[{"type":"FIX","url":"https://github.com/chamilo/chamilo-lms/commit/005dc8e9eccc6ea35264064ae09e2e84af8d5b59"},{"type":"FIX","url":"https://github.com/chamilo/chamilo-lms/commit/f7f93579ed64765c2667910b9c24d031b0a00571"},{"type":"FIX","url":"https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-67-2021-05-27-High-impact-very-high-risk-Unauthenticated-SQL-injection"},{"type":"EVIDENCE","url":"https://murat.one/?p=118"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}