NIXPKGS-2026-0088
GitHub issue
published on
Permalink
CVE-2025-67847
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package moodle-dl
- @LeSuisse accepted
- @LeSuisse published on GitHub
Moodle: moodle: remote code execution via insufficient restore input validation
A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application.
References
Affected products
moodle
- <4.1.0
- <4.5.8
- <5.1.1
- <4.4.12
- <5.0.4
- <4.1.22
Package maintainers
-
@freezeboy freezeboy