Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43427

0
Low
VulnerabilityCVE-2024-43427cvecve-2024-43427
Published: Mon Nov 11 2024 (11/11/2024, 12:14:22 UTC)
Source: CVE Database V5

Description

A flaw was found in moodle. When creating an export of site administration presets, some sensitive secrets and keys are not being excluded from the export, which could result in them unintentionally being leaked if the presets are shared with a third party.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:26:57 UTC

Technical Analysis

CVE-2024-43427 is a security vulnerability identified in the Moodle learning management system affecting versions 0, 4.2, 4.3, and 4.4. The flaw arises during the export process of site administration presets, where certain sensitive secrets and cryptographic keys are not properly excluded from the exported data. This oversight can lead to the unintentional disclosure of confidential credentials if the exported presets are shared with third parties, potentially exposing sensitive configuration details. The vulnerability is categorized under CWE-922, which relates to improper restriction of sensitive information in exported data. The CVSS 3.1 base score is 3.7 (low severity), with vector AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating that the vulnerability can be exploited remotely without authentication or user interaction but requires high attack complexity. The impact is limited to confidentiality loss, with no effect on integrity or availability. No public exploits have been reported so far. The vulnerability was published on November 11, 2024, and assigned by the Fedora security team. Since no patch links are currently available, administrators should exercise caution when exporting site presets and sharing them externally.

Potential Impact

The primary impact of CVE-2024-43427 is the potential leakage of sensitive secrets and keys contained within Moodle site administration presets. If these presets are shared with unauthorized third parties, attackers could gain access to confidential configuration data, which might facilitate further attacks such as unauthorized access or privilege escalation. However, the vulnerability does not directly allow system compromise, code execution, or denial of service. The scope is limited to confidentiality, and exploitation requires the export and external sharing of presets, which reduces the likelihood of widespread impact. Organizations relying on Moodle for educational or training purposes could face data confidentiality risks, especially if they handle sensitive user or institutional data. The absence of known exploits and the high attack complexity further reduce immediate risk, but the exposure of secrets could have long-term security implications if leveraged by attackers.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Avoid exporting site administration presets unless absolutely necessary; 2) If export is required, thoroughly review the exported files to identify and remove any sensitive secrets or keys before sharing; 3) Restrict access to exported preset files to trusted personnel only; 4) Implement strict access controls and monitoring around Moodle administrative functions to detect unauthorized export attempts; 5) Regularly audit Moodle configurations and secrets to ensure they are not inadvertently exposed; 6) Stay informed about Moodle security advisories for updates or patches addressing this vulnerability; 7) Consider isolating the Moodle administrative environment to minimize exposure; 8) Educate administrators about the risks of sharing exported presets and enforce policies to prevent accidental leaks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2024-08-13T07:15:00.597Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd6b7ef31ef0b569736

Added to database: 2/25/2026, 9:42:46 PM

Last enriched: 2/28/2026, 6:26:57 AM

Last updated: 4/12/2026, 1:55:28 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses