First published: Wed Jun 23 2021(Updated: )
A command execution vulnerability exists in the default legacy spellchecker plugin in a few Moodle multiple specific versions. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | =3.8.0 | |
composer/moodle/moodle | =3.11.2 | |
composer/moodle/moodle | =3.10.0 | |
Moodle | =3.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21809 has been classified as a high-severity vulnerability due to its potential for command execution with administrator privileges.
To fix CVE-2021-21809, upgrade to a patched version of Moodle, such as 3.11.3 or later.
CVE-2021-21809 affects Moodle versions 3.8.0, 3.10.0, and 3.11.2.
No, an attacker must have administrator privileges to exploit CVE-2021-21809.
CVE-2021-21809 is a command execution vulnerability that can be triggered by specially crafted HTTP requests.