Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0088

NIXPKGS-2026-0088
published on
Permalink CVE-2025-67847
8.8 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 months, 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package moodle-dl
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Moodle: moodle: remote code execution via insufficient restore input validation

A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application.

Affected products

moodle
  • <4.1.0
  • <4.5.8
  • <5.1.1
  • <4.4.12
  • <5.0.4
  • <4.1.22

Matching in nixpkgs

pkgs.moodle

Free and open-source learning management system (LMS) written in PHP

Package maintainers

Upstream advisory: https://moodle.org/mod/forum/discuss.php?d=471297#p1892199
Upstream patch: https://github.com/moodle/moodle/commit/1e7ff52667b88025ac919dbd84ee6a81dcc3166b