A flaw was identified in Moodle’s backup restore functionality where specially crafted backup files were not properly validated during processing. If a malicious backup file is restored, it could lead to unintended execution of server-side code. Since restore capabilities are typically available to privileged users, exploitation requires authenticated access. Successful exploitation could result in full compromise of the Moodle server.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-26045 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2440901 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Feb 2026, 19:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:* | |
| First Time |
Moodle moodle
Moodle |
|
| References | () https://access.redhat.com/security/cve/CVE-2026-26045 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2440901 - Third Party Advisory | |
| Summary |
|
21 Feb 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-21 06:16
Updated : 2026-02-26 19:47
NVD link : CVE-2026-26045
Mitre link : CVE-2026-26045
CVE.ORG link : CVE-2026-26045
JSON object : View
Products Affected
moodle
- moodle
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
