Moodle Moodle is an open source Learning Platform
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Moodle product.
RSS Feeds for Moodle security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Moodle products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Moodle Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 13 vulnerabilities in Moodle with an average score of 6.5 out of ten. Last year, in 2025 Moodle had 38 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Moodle in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.91.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 13 | 6.50 |
| 2025 | 38 | 5.59 |
| 2024 | 55 | 6.01 |
| 2023 | 47 | 6.41 |
| 2022 | 48 | 6.47 |
| 2021 | 21 | 7.42 |
| 2020 | 20 | 6.68 |
| 2019 | 27 | 5.98 |
| 2018 | 17 | 6.59 |
It may take a day or so for new Moodle vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Moodle Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-26047 | Feb 21, 2026 |
Moodle TeX Editor DoS via Mimetex pre-<4.5.9/5.0.5/5.1.2A denial-of-service vulnerability was identified in Moodles TeX formula editor. When rendering TeX content using mimetex, insufficient execution time limits could allow specially crafted formulas to consume excessive server resources. An authenticated user could abuse this behavior to degrade performance or cause service interruption. |
|
| CVE-2026-26046 | Feb 21, 2026 |
Command Injection via Moodle TeX Filter (v<4.5.9, <5.0.5, <5.1.2)A vulnerability was found in a Moodle TeX filter administrative setting where insufficient sanitization of configuration input could allow command injection. On sites where the TeX filter is enabled and ImageMagick is installed, a maliciously crafted setting value entered by an administrator could result in unintended system command execution. While exploitation requires administrative privileges, successful compromise could affect the entire Moodle server. |
|
| CVE-2026-26045 | Feb 21, 2026 |
Moodle Backup Restore RCE in v4.5.8 and earlier; fixed v4.5.9,5.0.5,5.1.2A flaw was identified in Moodles backup restore functionality where specially crafted backup files were not properly validated during processing. If a malicious backup file is restored, it could lead to unintended execution of server-side code. Since restore capabilities are typically available to privileged users, exploitation requires authenticated access. Successful exploitation could result in full compromise of the Moodle server. |
|
| CVE-2025-67857 | Feb 03, 2026 |
Moodle Anonymous Assignment URLs Leak User IDsA flaw was found in moodle. During anonymous assignment submissions, user identifiers were inadvertently exposed in URLs. This data exposure allows unauthorized viewers to see internal user IDs, compromising the intended anonymity and potentially leading to information disclosure. |
|
| CVE-2025-67856 | Feb 03, 2026 |
Moodle Badge Awarding RBAC Bypass Allows Privilege EscalationA flaw was found in Moodle. An authorization logic flaw, specifically due to incomplete role checks during the badge awarding process, allowed badges to be granted without proper verification. This could enable unauthorized users to obtain badges they are not entitled to, potentially leading to privilege escalation or unauthorized access to certain features. |
|
| CVE-2025-67855 | Feb 03, 2026 |
Moodle Reflected XSS in Policy Tool Return URLA flaw was found in mooodle. A remote attacker could exploit a reflected Cross-Site Scripting (XSS) vulnerability in the policy tool return URL. This vulnerability arises from insufficient sanitization of URL parameters, allowing attackers to inject malicious scripts through specially crafted links. Successful exploitation could lead to information disclosure or arbitrary client-side script execution within the user's browser. |
|
| CVE-2025-67853 | Feb 03, 2026 |
Moodle Brute-Force via Email Confirmation Rate LimitingA flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks against user accounts. |
|
| CVE-2025-67852 | Feb 03, 2026 |
Moodle OAuth Open Redirect Allows PhishingA flaw was found in Moodle. An open redirect vulnerability in the OAuth login flow allows a remote attacker to redirect users to attacker-controlled pages after they have successfully authenticated. This occurs due to insufficient validation of redirect parameters, which could lead to phishing attacks or information disclosure. |
|
| CVE-2025-67851 | Feb 03, 2026 |
Moodle Formula Injection via Unescaped Export (CVE-2025-67851)A flaw was found in moodle. This formula injection vulnerability occurs when data fields are exported without proper escaping. A remote attacker could exploit this by providing malicious data that, when exported and opened in a spreadsheet, allows arbitrary formulas to execute. This can lead to compromised data integrity and unintended operations within the spreadsheet. |
|
| CVE-2025-67850 | Feb 03, 2026 |
Moodle XSS in Formula Editor Allows Remote Code ExecA flaw was found in moodle. This vulnerability, known as Cross-Site Scripting (XSS), occurs due to insufficient checks on user-provided data in the formula editor's arithmetic expression fields. A remote attacker could inject malicious code into these fields. When other users view these expressions, the malicious code would execute in their web browsers, potentially compromising their data or leading to unauthorized actions. |
|