A flaw was identified in Moodle’s backup restore functionality where specially crafted backup files were not properly validated during processing. If a malicious backup file is restored, it could lead to unintended execution of server-side code. Since restore capabilities are typically available to privileged users, exploitation requires authenticated access. Successful exploitation could result in full compromise of the Moodle server.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-26045 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2440901 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-21 06:16
Updated : 2026-02-26 19:47
NVD link : CVE-2026-26045
Mitre link : CVE-2026-26045
CVE.ORG link : CVE-2026-26045
JSON object : View
Products Affected
moodle
- moodle
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
