CVE-2025-67847: Improper Control of Generation of Code ('Code Injection')
CVE-2025-67847 is a high-severity code injection vulnerability in Moodle affecting versions 4. 1. 0 through 5. 1. 0. An attacker with authenticated access to the restore interface can exploit insufficient input validation to execute arbitrary code on the server. This flaw allows full compromise of the Moodle application, impacting confidentiality, integrity, and availability. No user interaction beyond authentication is required, and the vulnerability can be exploited remotely over the network. Although no known exploits are currently in the wild, the high CVSS score (8. 8) indicates significant risk.
AI Analysis
Technical Summary
CVE-2025-67847 is a critical vulnerability identified in the Moodle learning management system, specifically affecting versions 4.1.0 through 5.1.0. The flaw arises from improper control over code generation during the restore process, where insufficient validation of input data allows an attacker with authenticated access to the restore interface to inject and execute arbitrary server-side code. This vulnerability is classified as a code injection issue, which can lead to a complete compromise of the Moodle application, including unauthorized data access, modification, or destruction, and potentially pivoting to other parts of the hosting environment. The attack vector is network-based, requiring low attack complexity and only privileges to access the restore interface, but no user interaction beyond authentication is needed. The vulnerability affects core restore routines that interpret input data insecurely, enabling malicious payloads to be executed. Although no public exploits have been reported yet, the high CVSS score of 8.8 reflects the severity and ease of exploitation. Moodle is widely used across educational institutions globally, making this vulnerability particularly concerning for environments relying on Moodle for critical educational services and data management.
Potential Impact
For European organizations, the impact of CVE-2025-67847 can be severe. Educational institutions, universities, and e-learning providers relying on Moodle could face full application compromise, leading to unauthorized access to sensitive student and staff data, disruption of educational services, and potential data loss or manipulation. The breach could also serve as a foothold for attackers to move laterally within organizational networks, increasing the risk of broader IT infrastructure compromise. Given the critical role of Moodle in managing coursework, assessments, and communications, exploitation could disrupt academic operations and damage institutional reputation. Additionally, compliance with data protection regulations such as GDPR could be jeopardized if personal data is exposed or mishandled due to this vulnerability. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability’s characteristics suggest it could be targeted by attackers soon after public disclosure.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Apply security patches or updates from Moodle as soon as they become available to address CVE-2025-67847. 2) Restrict access to the restore interface to only trusted and necessary personnel, ideally through network segmentation and access control lists. 3) Implement multi-factor authentication (MFA) for all users with restore interface privileges to reduce the risk of credential compromise. 4) Monitor logs and audit restore operations for unusual or unauthorized activity. 5) Conduct regular security assessments and code reviews of custom Moodle plugins or integrations that might interact with the restore process. 6) Educate administrators about the risks associated with restore operations and enforce strict input validation policies where possible. 7) Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious restore interface requests. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-67847: Improper Control of Generation of Code ('Code Injection')
Description
CVE-2025-67847 is a high-severity code injection vulnerability in Moodle affecting versions 4. 1. 0 through 5. 1. 0. An attacker with authenticated access to the restore interface can exploit insufficient input validation to execute arbitrary code on the server. This flaw allows full compromise of the Moodle application, impacting confidentiality, integrity, and availability. No user interaction beyond authentication is required, and the vulnerability can be exploited remotely over the network. Although no known exploits are currently in the wild, the high CVSS score (8. 8) indicates significant risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-67847 is a critical vulnerability identified in the Moodle learning management system, specifically affecting versions 4.1.0 through 5.1.0. The flaw arises from improper control over code generation during the restore process, where insufficient validation of input data allows an attacker with authenticated access to the restore interface to inject and execute arbitrary server-side code. This vulnerability is classified as a code injection issue, which can lead to a complete compromise of the Moodle application, including unauthorized data access, modification, or destruction, and potentially pivoting to other parts of the hosting environment. The attack vector is network-based, requiring low attack complexity and only privileges to access the restore interface, but no user interaction beyond authentication is needed. The vulnerability affects core restore routines that interpret input data insecurely, enabling malicious payloads to be executed. Although no public exploits have been reported yet, the high CVSS score of 8.8 reflects the severity and ease of exploitation. Moodle is widely used across educational institutions globally, making this vulnerability particularly concerning for environments relying on Moodle for critical educational services and data management.
Potential Impact
For European organizations, the impact of CVE-2025-67847 can be severe. Educational institutions, universities, and e-learning providers relying on Moodle could face full application compromise, leading to unauthorized access to sensitive student and staff data, disruption of educational services, and potential data loss or manipulation. The breach could also serve as a foothold for attackers to move laterally within organizational networks, increasing the risk of broader IT infrastructure compromise. Given the critical role of Moodle in managing coursework, assessments, and communications, exploitation could disrupt academic operations and damage institutional reputation. Additionally, compliance with data protection regulations such as GDPR could be jeopardized if personal data is exposed or mishandled due to this vulnerability. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability’s characteristics suggest it could be targeted by attackers soon after public disclosure.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Apply security patches or updates from Moodle as soon as they become available to address CVE-2025-67847. 2) Restrict access to the restore interface to only trusted and necessary personnel, ideally through network segmentation and access control lists. 3) Implement multi-factor authentication (MFA) for all users with restore interface privileges to reduce the risk of credential compromise. 4) Monitor logs and audit restore operations for unusual or unauthorized activity. 5) Conduct regular security assessments and code reviews of custom Moodle plugins or integrations that might interact with the restore process. 6) Educate administrators about the risks associated with restore operations and enforce strict input validation policies where possible. 7) Consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious restore interface requests. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fedora
- Date Reserved
- 2025-12-12T13:00:24.329Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697301b44623b1157c02f7e3
Added to database: 1/23/2026, 5:05:56 AM
Last enriched: 2/7/2026, 8:27:36 AM
Last updated: 2/7/2026, 6:49:05 PM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.