CVE-2021-21809
CRITICALMoodle Authenticated Spelling Binary RCE
Title source: metasploitDescription
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
Exploits (2)
metasploit
WORKING POC
EXCELLENT
by Adam Reiser, h00die · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/moodle_spelling_path_rce.rb
Scores
CVSS v3
9.1
EPSS
0.7290
EPSS Percentile
98.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (2)
moodle/moodle
3.10.0
moodle/moodle
Packagist
Published
Jun 23, 2021
Tracked Since
Feb 18, 2026