Moodle Moodle Moodle is an open source Learning Platform

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Moodle product.

RSS Feeds for Moodle security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Moodle products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Moodle Sorted by Most Security Vulnerabilities since 2018

Moodle322 vulnerabilities

By the Year

In 2026 there have been 13 vulnerabilities in Moodle with an average score of 6.5 out of ten. Last year, in 2025 Moodle had 38 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Moodle in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.91.




Year Vulnerabilities Average Score
2026 13 6.50
2025 38 5.59
2024 55 6.01
2023 47 6.41
2022 48 6.47
2021 21 7.42
2020 20 6.68
2019 27 5.98
2018 17 6.59

It may take a day or so for new Moodle vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Moodle Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-26047 Feb 21, 2026
Moodle TeX Editor DoS via Mimetex pre-<4.5.9/5.0.5/5.1.2 A denial-of-service vulnerability was identified in Moodles TeX formula editor. When rendering TeX content using mimetex, insufficient execution time limits could allow specially crafted formulas to consume excessive server resources. An authenticated user could abuse this behavior to degrade performance or cause service interruption.
Moodle
CVE-2026-26046 Feb 21, 2026
Command Injection via Moodle TeX Filter (v<4.5.9, <5.0.5, <5.1.2) A vulnerability was found in a Moodle TeX filter administrative setting where insufficient sanitization of configuration input could allow command injection. On sites where the TeX filter is enabled and ImageMagick is installed, a maliciously crafted setting value entered by an administrator could result in unintended system command execution. While exploitation requires administrative privileges, successful compromise could affect the entire Moodle server.
Moodle
CVE-2026-26045 Feb 21, 2026
Moodle Backup Restore RCE in v4.5.8 and earlier; fixed v4.5.9,5.0.5,5.1.2 A flaw was identified in Moodles backup restore functionality where specially crafted backup files were not properly validated during processing. If a malicious backup file is restored, it could lead to unintended execution of server-side code. Since restore capabilities are typically available to privileged users, exploitation requires authenticated access. Successful exploitation could result in full compromise of the Moodle server.
Moodle
CVE-2025-67857 Feb 03, 2026
Moodle Anonymous Assignment URLs Leak User IDs A flaw was found in moodle. During anonymous assignment submissions, user identifiers were inadvertently exposed in URLs. This data exposure allows unauthorized viewers to see internal user IDs, compromising the intended anonymity and potentially leading to information disclosure.
Moodle
CVE-2025-67856 Feb 03, 2026
Moodle Badge Awarding RBAC Bypass Allows Privilege Escalation A flaw was found in Moodle. An authorization logic flaw, specifically due to incomplete role checks during the badge awarding process, allowed badges to be granted without proper verification. This could enable unauthorized users to obtain badges they are not entitled to, potentially leading to privilege escalation or unauthorized access to certain features.
Moodle
CVE-2025-67855 Feb 03, 2026
Moodle Reflected XSS in Policy Tool Return URL A flaw was found in mooodle. A remote attacker could exploit a reflected Cross-Site Scripting (XSS) vulnerability in the policy tool return URL. This vulnerability arises from insufficient sanitization of URL parameters, allowing attackers to inject malicious scripts through specially crafted links. Successful exploitation could lead to information disclosure or arbitrary client-side script execution within the user's browser.
Moodle
CVE-2025-67853 Feb 03, 2026
Moodle Brute-Force via Email Confirmation Rate Limiting A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks against user accounts.
Moodle
CVE-2025-67852 Feb 03, 2026
Moodle OAuth Open Redirect Allows Phishing A flaw was found in Moodle. An open redirect vulnerability in the OAuth login flow allows a remote attacker to redirect users to attacker-controlled pages after they have successfully authenticated. This occurs due to insufficient validation of redirect parameters, which could lead to phishing attacks or information disclosure.
Moodle
CVE-2025-67851 Feb 03, 2026
Moodle Formula Injection via Unescaped Export (CVE-2025-67851) A flaw was found in moodle. This formula injection vulnerability occurs when data fields are exported without proper escaping. A remote attacker could exploit this by providing malicious data that, when exported and opened in a spreadsheet, allows arbitrary formulas to execute. This can lead to compromised data integrity and unintended operations within the spreadsheet.
Moodle
CVE-2025-67850 Feb 03, 2026
Moodle XSS in Formula Editor Allows Remote Code Exec A flaw was found in moodle. This vulnerability, known as Cross-Site Scripting (XSS), occurs due to insufficient checks on user-provided data in the formula editor's arithmetic expression fields. A remote attacker could inject malicious code into these fields. When other users view these expressions, the malicious code would execute in their web browsers, potentially compromising their data or leading to unauthorized actions.
Moodle
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.