Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xvmh-25jw-gmmm | Moodle affected by a code injection vulnerability |
| Link | Providers |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-67847 |
|
Thu, 05 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:* cpe:2.3:a:moodle:moodle:5.1.0:-:*:*:*:*:*:* |
Fri, 23 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Moodle
Moodle moodle |
|
| Vendors & Products |
Moodle
Moodle moodle |
Fri, 23 Jan 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application. | |
| Title | Moodle: moodle: remote code execution via insufficient restore input validation | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2026-02-26T14:44:24.914Z
Reserved: 2025-12-12T13:00:24.329Z
Link: CVE-2025-67847
Updated: 2026-01-23T18:45:31.625Z
Status : Analyzed
Published: 2026-01-23T05:16:24.250
Modified: 2026-03-05T21:00:56.303
Link: CVE-2025-67847
No data.
OpenCVE Enrichment
Updated: 2026-01-23T10:26:37Z
Github GHSA