Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43425

0
High
VulnerabilityCVE-2024-43425cvecve-2024-43425
Published: Thu Nov 07 2024 (11/07/2024, 13:21:59 UTC)
Source: CVE Database V5

Description

A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:44:52 UTC

Technical Analysis

CVE-2024-43425 is a critical vulnerability identified in Moodle, an open-source learning management system widely used by educational institutions and organizations worldwide. The vulnerability resides in the calculated question types feature, where insufficient restrictions allow an attacker with the capability to add or update questions to execute arbitrary code remotely. This flaw is categorized under CWE-94 (Improper Control of Generation of Code), indicating that user-supplied input can be interpreted as code and executed by the system. The vulnerability affects Moodle versions 0, 4.2, 4.3, and 4.4. The CVSS 3.1 base score is 8.1, reflecting a high-severity risk with network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The attack complexity is high, meaning exploitation requires specific conditions or knowledge, but no authentication or user interaction is needed. Although no known exploits are currently reported in the wild, the potential for remote code execution makes this a significant threat. The flaw requires the attacker to have the capability to add or update questions, which typically corresponds to roles such as teachers or content creators, but if compromised, could lead to full system compromise. The lack of available patches at the time of reporting necessitates immediate mitigation through access control and monitoring.

Potential Impact

The impact of CVE-2024-43425 is substantial for organizations using Moodle, particularly educational institutions, training providers, and enterprises relying on Moodle for e-learning. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the Moodle server. This can result in unauthorized data access, data manipulation, disruption of learning services, and potential lateral movement within the network. Confidentiality is at risk as sensitive student and staff data could be exposed. Integrity is compromised as attackers could alter course content or grades. Availability could be affected if attackers disrupt Moodle services or deploy ransomware. Given Moodle's widespread use globally, the vulnerability poses a significant risk to the continuity and security of online education platforms. The requirement for the capability to add or update questions limits the attack surface but does not eliminate risk, especially in environments with many users having elevated permissions or weak internal controls.

Mitigation Recommendations

To mitigate CVE-2024-43425, organizations should immediately review and restrict permissions related to adding or updating questions in Moodle, ensuring only trusted and necessary users have these capabilities. Implement strict role-based access controls (RBAC) and audit all users with elevated privileges. Monitor Moodle logs for unusual activity related to question creation or modification. Until an official patch is released, consider disabling the calculated question types feature if feasible or applying custom input validation and sanitization on question inputs. Employ network segmentation to isolate Moodle servers and limit exposure. Regularly update Moodle installations and subscribe to Moodle security advisories for timely patch deployment. Conduct security awareness training for administrators and educators about the risks of privilege misuse. Additionally, implement web application firewalls (WAFs) with rules to detect and block suspicious payloads targeting question inputs. Finally, maintain regular backups of Moodle data and configurations to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2024-08-13T07:15:00.597Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd6b7ef31ef0b5696de

Added to database: 2/25/2026, 9:42:46 PM

Last enriched: 2/26/2026, 7:44:52 AM

Last updated: 4/12/2026, 10:36:01 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses