Chamilo LMS is a learning management system. Prior to 1.11.38, there is a path traversal in main/exercise/savescores.php leading to arbitrary file feletion. User input from $_REQUEST['test'] is concatenated directly into filesystem path without canonicalization or traversal checks. This vulnerability is fixed in 1.11.38.
Exploitability
AV:NAC:LPR:LUI:NScope
S:UImpact
C:LI:HA:H8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:HInput Validation