Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-ggxq-2mg9-8966 | Moodle has a Remote Code Execution risk via file restore |
Thu, 26 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:* |
Mon, 23 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Moodle
Moodle moodle |
|
| Vendors & Products |
Moodle
Moodle moodle |
Sat, 21 Feb 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was identified in Moodle’s backup restore functionality where specially crafted backup files were not properly validated during processing. If a malicious backup file is restored, it could lead to unintended execution of server-side code. Since restore capabilities are typically available to privileged users, exploitation requires authenticated access. Successful exploitation could result in full compromise of the Moodle server. | |
| Title | Moodle: moodle: improper validation in file restore functionality leading to remote code execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2026-02-26T14:44:11.999Z
Reserved: 2026-02-10T13:30:03.985Z
Link: CVE-2026-26045
Updated: 2026-02-23T19:31:58.688Z
Status : Analyzed
Published: 2026-02-21T06:16:58.867
Modified: 2026-02-26T19:47:42.953
Link: CVE-2026-26045
No data.
OpenCVE Enrichment
Updated: 2026-04-17T17:00:10Z
Github GHSA