Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43435

0
Medium
VulnerabilityCVE-2024-43435cvecve-2024-43435
Published: Mon Nov 11 2024 (11/11/2024, 12:17:26 UTC)
Source: CVE Database V5

Description

A flaw was found in moodle. Insufficient capability checks make it possible for users with access to restore glossaries in courses to restore them into the global site glossary.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:28:40 UTC

Technical Analysis

CVE-2024-43435 is a security vulnerability identified in Moodle, an open-source learning management system widely used in educational institutions and organizations. The flaw arises from insufficient capability checks during the glossary restore process. Specifically, users who have permission to restore glossaries within individual courses can exploit this vulnerability to restore glossaries into the global site glossary, which is typically restricted to higher privileged users. This improper access control is classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions). The vulnerability affects Moodle versions 0, 4.2, 4.3, and 4.4. The CVSS v3.1 base score is 5.3 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and no availability impact (A:N). This means an unauthenticated attacker can remotely exploit the flaw to alter the global glossary content, potentially injecting unauthorized or malicious glossary entries that affect the integrity of shared educational resources. There are no patches currently linked, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of CVE-2024-43435 is on data integrity within Moodle's global glossary. An attacker exploiting this vulnerability can insert or modify glossary entries at the global site level, which could mislead users, spread misinformation, or introduce malicious content. While this does not directly compromise confidentiality or availability, the integrity breach can undermine trust in educational content and disrupt learning processes. Organizations relying on Moodle for critical training or certification may face reputational damage or compliance issues if glossary content is manipulated. Since exploitation requires only glossary restore permissions, which may be granted to course administrators or instructors, the attack surface is moderate. The lack of required authentication or user interaction increases the risk of automated exploitation attempts if the vulnerability is weaponized.

Mitigation Recommendations

To mitigate CVE-2024-43435, organizations should first monitor Moodle vendor advisories for official patches or updates addressing this flaw and apply them promptly once available. Until patches are released, administrators should review and restrict permissions related to glossary restoration, ensuring only highly trusted users have this capability. Implement role-based access controls to limit the ability to restore glossaries to global or site-wide contexts. Conduct audits of existing glossary content to detect unauthorized changes. Additionally, consider implementing monitoring and alerting for unusual glossary restoration activities. Network-level protections such as web application firewalls (WAFs) can be tuned to detect and block suspicious requests targeting glossary restore functions. Finally, educate Moodle administrators and instructors about the risk and encourage vigilance in permission assignments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2024-08-13T07:15:00.598Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd6b7ef31ef0b569756

Added to database: 2/25/2026, 9:42:46 PM

Last enriched: 2/28/2026, 6:28:40 AM

Last updated: 4/12/2026, 3:46:42 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses