CVE-2026-26045: Moodle has a Remote Code Execution risk via file restore
(updated )
A flaw was identified in Moodle’s backup restore functionality where specially crafted backup files were not properly validated during processing. If a malicious backup file is restored, it could lead to unintended execution of server-side code. Since restore capabilities are typically available to privileged users, exploitation requires authenticated access. Successful exploitation could result in full compromise of the Moodle server.
References
- access.redhat.com/security/cve/CVE-2026-26045
- bugzilla.redhat.com/show_bug.cgi?id=2440901
- github.com/advisories/GHSA-ggxq-2mg9-8966
- github.com/moodle/moodle
- github.com/moodle/moodle/commit/566054ba11f609a6d48d09b32e85d435d49927da
- moodle.org/mod/forum/discuss.php?d=473314
- nvd.nist.gov/vuln/detail/CVE-2026-26045
Code Behaviors & Features
Detect and mitigate CVE-2026-26045 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →