8.8

CVE-2025-67847

Moodle: moodle: remote code execution via insufficient restore input validation

Remote code execution risk via file restore

A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application.
Mögliche Gegenmaßnahme
Moodle Server: Update to a patched version.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
MoodleMoodle Version < 4.1.22
MoodleMoodle Version >= 4.4.0 < 4.4.12
MoodleMoodle Version >= 4.5.0 < 4.5.8
MoodleMoodle Version >= 5.0.0 < 5.0.4
MoodleMoodle Version5.1.0 Update-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemMoodle
Produkt Moodle Server
Version < 4.1.0
Version >= 5.1.0, < 5.1.1
Version >= 5.0.0, < 5.0.4
Version >= 4.5.0, < 4.5.8
Version >= 4.4.0, < 4.4.12
Version >= 4.1.0, < 4.1.22
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.169
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
patrick@puiterwijk.org 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.