First published: Wed Jun 23 2021(Updated: )
A command execution vulnerability exists in the default legacy spellchecker plugin in a few Moodle multiple specific versions. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle Moodle | =3.10.0 | |
composer/moodle/moodle | =3.8.0 | |
composer/moodle/moodle | =3.11.2 | |
composer/moodle/moodle | =3.10.0 | |
=3.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.