Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26046: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

0
High
VulnerabilityCVE-2026-26046cvecve-2026-26046
Published: Sat Feb 21 2026 (02/21/2026, 05:40:08 UTC)
Source: CVE Database V5

Description

CVE-2026-26046 is a high-severity OS command injection vulnerability in Moodle's TeX filter administrative setting. It arises from improper sanitization of configuration input, allowing an administrator to inject malicious system commands if ImageMagick is installed and the TeX filter is enabled. Exploitation requires administrative privileges but can lead to full compromise of the Moodle server, affecting confidentiality, integrity, and availability. The vulnerability impacts Moodle versions 0, 5. 0. 0, and 5. 1. 0. No known exploits are currently reported in the wild. Organizations running Moodle with these configurations should prioritize patching and restrict administrative access to mitigate risk.

AI-Powered Analysis

AILast updated: 02/21/2026, 06:16:45 UTC

Technical Analysis

CVE-2026-26046 is an OS command injection vulnerability identified in Moodle's TeX filter administrative setting. The root cause is insufficient sanitization of configuration input fields used by the TeX filter, which, when enabled alongside ImageMagick installation, allows an attacker with administrative privileges to inject and execute arbitrary system commands. This vulnerability affects Moodle versions 0, 5.0.0, and 5.1.0. The TeX filter is a feature that processes LaTeX or TeX markup to generate images or mathematical expressions, often relying on ImageMagick for image processing. Because the vulnerability requires administrative privileges, exploitation is limited to trusted users or attackers who have already compromised an admin account. However, successful exploitation can lead to full server compromise, including data theft, defacement, or service disruption. The CVSS v3.1 score is 7.2, indicating high severity, with attack vector network-based, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability's nature and impact warrant urgent attention. The vulnerability was published on February 21, 2026, and is tracked under CVE-2026-26046.

Potential Impact

The potential impact of CVE-2026-26046 is significant for organizations using Moodle with the TeX filter enabled and ImageMagick installed. An attacker with administrative access could execute arbitrary commands on the underlying server, leading to full system compromise. This could result in unauthorized data access or exfiltration, modification or deletion of critical educational content, disruption of learning services, and potential lateral movement within the network. Given Moodle's widespread use in educational institutions globally, the vulnerability could affect universities, schools, and training providers, potentially impacting millions of users. The requirement for administrative privileges limits the attack surface but does not eliminate risk, especially in environments with weak admin credential management or insider threats. The compromise of Moodle servers could also damage organizational reputation and lead to regulatory compliance issues related to data protection.

Mitigation Recommendations

To mitigate CVE-2026-26046, organizations should: 1) Immediately update Moodle to a patched version once available, or apply any vendor-provided security patches or configuration workarounds. 2) Disable the TeX filter if it is not essential to reduce the attack surface. 3) Restrict administrative access to trusted personnel only, enforce strong authentication mechanisms such as multi-factor authentication, and regularly audit admin accounts for suspicious activity. 4) Limit or isolate the Moodle server's ability to execute system commands or interact with ImageMagick through OS-level controls such as AppArmor, SELinux, or containerization. 5) Monitor Moodle logs and system logs for unusual command execution or configuration changes. 6) Educate administrators on secure configuration practices and the risks of injecting untrusted input. 7) Implement network segmentation to limit the impact of a compromised Moodle server. These steps go beyond generic advice by focusing on reducing the attack vector and hardening the environment against privilege misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2026-02-10T13:30:03.985Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69994a6fbe58cf853b51dfb8

Added to database: 2/21/2026, 6:02:23 AM

Last enriched: 2/21/2026, 6:16:45 AM

Last updated: 2/21/2026, 7:25:46 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats