Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26046: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

0
High
VulnerabilityCVE-2026-26046cvecve-2026-26046
Published: Sat Feb 21 2026 (02/21/2026, 05:40:08 UTC)
Source: CVE Database V5

Description

A vulnerability was found in a Moodle TeX filter administrative setting where insufficient sanitization of configuration input could allow command injection. On sites where the TeX filter is enabled and ImageMagick is installed, a maliciously crafted setting value entered by an administrator could result in unintended system command execution. While exploitation requires administrative privileges, successful compromise could affect the entire Moodle server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 00:44:50 UTC

Technical Analysis

CVE-2026-26046 is an OS command injection vulnerability identified in the Moodle TeX filter administrative setting. The root cause is insufficient sanitization of configuration input fields, which allows specially crafted input by an administrator to be interpreted as system commands. This vulnerability manifests when the TeX filter is enabled and ImageMagick is installed on the server, as the filter interacts with ImageMagick for rendering TeX content. An attacker with administrative privileges can exploit this flaw by entering malicious configuration values, leading to arbitrary command execution on the underlying operating system. The vulnerability affects Moodle versions 0, 5.0.0, and 5.1.0. The CVSS v3.1 score is 7.2, indicating high severity, with attack vector as network, low attack complexity, requiring high privileges but no user interaction. Successful exploitation compromises confidentiality, integrity, and availability of the Moodle server, potentially allowing full system takeover. No public exploits are known at this time, but the vulnerability poses a significant risk to Moodle deployments that have not applied patches or mitigations. The flaw underscores the importance of rigorous input validation and secure configuration management in web applications, especially those with administrative interfaces.

Potential Impact

The impact of CVE-2026-26046 is substantial for organizations using affected Moodle versions with the TeX filter enabled and ImageMagick installed. An attacker with administrative access can execute arbitrary OS commands, potentially leading to full server compromise. This can result in unauthorized data access, data modification or deletion, disruption of Moodle services, and use of the compromised server as a pivot point for further attacks within the network. Educational institutions, online learning platforms, and enterprises relying on Moodle for critical operations could face significant operational disruption and data breaches. The requirement for administrative privileges limits the attack surface but does not eliminate risk, as insider threats or compromised admin accounts could be leveraged. The vulnerability could also damage organizational reputation and lead to compliance violations if sensitive student or user data is exposed.

Mitigation Recommendations

To mitigate CVE-2026-26046, organizations should immediately update Moodle to a patched version once available. In the absence of patches, administrators should disable the TeX filter if not essential or remove ImageMagick from the server to break the exploitation chain. Strictly limit administrative access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication. Regularly audit administrative configurations for suspicious or unexpected entries. Employ application-layer firewalls or intrusion detection systems to monitor and block anomalous command execution attempts. Additionally, implement strict input validation and sanitization controls in custom Moodle plugins or configurations. Regular backups and incident response plans should be in place to recover from potential compromises. Monitoring logs for unusual administrative activity can help detect exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2026-02-10T13:30:03.985Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69994a6fbe58cf853b51dfb8

Added to database: 2/21/2026, 6:02:23 AM

Last enriched: 3/1/2026, 12:44:50 AM

Last updated: 4/7/2026, 1:36:48 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses