A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c7jj-vfmr-j9mj Moodle command execution vulnerability exists in the default legacy spellchecker plugin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-08-03T18:23:29.453Z

Reserved: 2021-01-04T00:00:00

Link: CVE-2021-21809

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-23T22:15:08.407

Modified: 2024-11-21T05:49:01.033

Link: CVE-2021-21809

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.