Search for vulnerabilities
Vulnerability ID | VCID-qb2h-v2c4-a7e1 |
Aliases |
CVE-2021-21809
GHSA-c7jj-vfmr-j9mj |
Summary | Moodle command execution vulnerability exists in the default legacy spellchecker plugin A command execution vulnerability exists in the default legacy spellchecker plugin in a few Moodle multiple specific versions. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 9.0 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
cvssv3.1 | 9.1 | http://packetstormsecurity.com/files/164481/Moodle-SpellChecker-Path-Authenticated-Remote-Command-Execution.html |
generic_textual | CRITICAL | http://packetstormsecurity.com/files/164481/Moodle-SpellChecker-Path-Authenticated-Remote-Command-Execution.html |
epss | 0.69115 | https://api.first.org/data/v1/epss?cve=CVE-2021-21809 |
epss | 0.69115 | https://api.first.org/data/v1/epss?cve=CVE-2021-21809 |
cvssv3.1_qr | CRITICAL | https://github.com/advisories/GHSA-c7jj-vfmr-j9mj |
cvssv3.1 | 9.1 | https://github.com/moodle/moodle |
generic_textual | CRITICAL | https://github.com/moodle/moodle |
cvssv2 | 9.0 | https://nvd.nist.gov/vuln/detail/CVE-2021-21809 |
cvssv3.1 | 9.1 | https://nvd.nist.gov/vuln/detail/CVE-2021-21809 |
generic_textual | CRITICAL | https://nvd.nist.gov/vuln/detail/CVE-2021-21809 |
cvssv3.1 | 9.1 | https://talosintelligence.com/vulnerability_reports/TALOS-2021-1277 |
generic_textual | CRITICAL | https://talosintelligence.com/vulnerability_reports/TALOS-2021-1277 |
Data source | Metasploit |
---|---|
Description | Moodle allows an authenticated administrator to define spellcheck settings via the web interface. An administrator can update the aspell path to include a command injection. This is extremely similar to CVE-2013-3630, just using a different variable. This module was tested against Moodle version 3.11.2, 3.10.0, and 3.8.0. |
Note | Stability: - crash-safe Reliability: - repeatable-session SideEffects: - config-changes - ioc-in-logs |
Ransomware campaign use | Unknown |
Source publication date | June 22, 2021 |
Platform | PHP |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/http/moodle_spelling_path_rce.rb |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.98529 |
EPSS Score | 0.69115 |
Published At | June 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-01T12:26:39.070122+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-c7jj-vfmr-j9mj/GHSA-c7jj-vfmr-j9mj.json | 36.1.3 |