CVE-2024-43425
PHP vulnerability analysis and mitigation

Overview

CVE-2024-43425 is a critical vulnerability discovered in Moodle, a widely-used Learning Management System. The vulnerability was disclosed on August 27, 2024, affecting versions 4.4 to 4.4.1, 4.3 to 4.3.5, 4.2 to 4.2.8, 4.1 to 4.1.11, and earlier unsupported versions. The flaw exists in the calculated question types functionality, where additional restrictions were required to avoid a remote code execution risk (Moodle Forum, Censys Report).

Technical details

The vulnerability arises from improper handling of calculated question types in Moodle. It is classified as CWE-94 (Improper Control of Generation of Code), allowing for potential code injection. The vulnerability has received a CVSS v3.1 base score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

If exploited, CVE-2024-43425 could allow an attacker to execute arbitrary code on affected Moodle instances through calculated question types. This could potentially lead to unauthorized access, data breaches, and complete system compromise. The vulnerability is particularly concerning as it allows authenticated users with specific privileges to execute arbitrary code (Censys Report).

Mitigation and workarounds

Moodle has released patches to address this vulnerability in versions 4.4.2, 4.3.6, 4.2.9, and 4.1.12. Organizations are strongly advised to update their Moodle installations to these patched versions immediately to mitigate the risk (Moodle Forum).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management