CVE-2024-43425
HIGH NUCLEIMoodle Remote Code Execution (CVE-2024-43425)
Title source: metasploitDescription
A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.
Exploits (9)
exploitdb
WORKING POC
by Likhith Appalaneni · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52350
nomisec
WORKING POC
19 stars
by RedTeamPentesting · poc
https://github.com/RedTeamPentesting/moodle-rce-calculatedquestions
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2024/CVE-2024-43425
nomisec
WORKING POC
2 stars
by kazuya256 · poc
https://github.com/kazuya256/Moodle-authenticated-RCE
metasploit
WORKING POC
EXCELLENT
by Michael Heinzl, RedTeam Pentesting GmbH · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/moodle_rce.rb
Nuclei Templates (1)
Moodle - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
title:"Moodle"
Scores
CVSS v3
8.1
EPSS
0.8929
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-94
Status
published
Products (2)
moodle/moodle
< 4.1.12
moodle/moodle
0 - 4.1.12Packagist
Published
Nov 07, 2024
Tracked Since
Feb 18, 2026