CVE-2024-43425

HIGH NUCLEI

Moodle Remote Code Execution (CVE-2024-43425)

Title source: metasploit

Description

A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.

Exploits (9)

exploitdb WORKING POC
by Likhith Appalaneni · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52350
nomisec WORKING POC 19 stars
by RedTeamPentesting · poc
https://github.com/RedTeamPentesting/moodle-rce-calculatedquestions
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2024/CVE-2024-43425
nomisec WORKING POC 2 stars
by kazuya256 · poc
https://github.com/kazuya256/Moodle-authenticated-RCE
nomisec WORKING POC 2 stars
by Snizi · poc
https://github.com/Snizi/Moodle-CVE-2024-43425-Exploit
nomisec WORKING POC 1 stars
by wvverez · poc
https://github.com/wvverez/CVE-2024-43425
nomisec WRITEUP
by Tnot123 · poc
https://github.com/Tnot123/cve-2024-43425
nomisec WORKING POC
by aninfosec · poc
https://github.com/aninfosec/CVE-2024-43425-Poc
metasploit WORKING POC EXCELLENT
by Michael Heinzl, RedTeam Pentesting GmbH · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/moodle_rce.rb

Nuclei Templates (1)

Moodle - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: title:"Moodle"

Scores

CVSS v3 8.1
EPSS 0.8929
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-94
Status published
Products (2)
moodle/moodle < 4.1.12
moodle/moodle 0 - 4.1.12Packagist
Published Nov 07, 2024
Tracked Since Feb 18, 2026