Refine your search

99 vulnerabilities found for moodle by moodle

CERTFR-2025-AVI-0957
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de requêtes illégitimes par rebond (CSRF) et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Moodle Moodle Moodle versions antérieures à 5.0.3
Moodle Moodle Moodle versions antérieures à 4.1.21
Moodle Moodle Moodle versions antérieures à 4.4.11
Moodle Moodle Moodle versions antérieures à 4.5.7
References
Bulletin de sécurité Moodle MSA-25-0041 2025-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0045 2025-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0044 2025-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0050 2025-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0048 2025-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0038 2025-08-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0040 2025-08-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0049 2025-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0046 2025-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0042 2025-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0039 2025-08-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0037 2025-08-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0047 2025-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0043 2025-10-14 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 5.0.3",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 4.1.21",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 4.4.11 ",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 4.5.7",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-62394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62394"
    },
    {
      "name": "CVE-2025-62401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62401"
    },
    {
      "name": "CVE-2025-62398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62398"
    },
    {
      "name": "CVE-2025-62437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62437"
    },
    {
      "name": "CVE-2025-62397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62397"
    },
    {
      "name": "CVE-2025-62436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62436"
    },
    {
      "name": "CVE-2025-54869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54869"
    },
    {
      "name": "CVE-2025-62396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62396"
    },
    {
      "name": "CVE-2025-62438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62438"
    },
    {
      "name": "CVE-2025-62393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62393"
    },
    {
      "name": "CVE-2025-62399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62399"
    },
    {
      "name": "CVE-2025-62395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62395"
    },
    {
      "name": "CVE-2025-62400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62400"
    },
    {
      "name": "CVE-2025-62435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62435"
    }
  ],
  "initial_release_date": "2025-11-03T00:00:00",
  "last_revision_date": "2025-11-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0957",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-11-03T00:00:00.000000"
    },
    {
      "description": "Ajout du risque CSRF et modification des liens \u00e9diteurs.",
      "revision_date": "2025-11-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF) et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle ",
  "vendor_advisories": [
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0041",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470381"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0045",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470385"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0044",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470384"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0050",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470390"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0048",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470388"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0038",
      "url": "https://moodle.org/mod/forum/discuss.php?d=469491"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0040",
      "url": "https://moodle.org/mod/forum/discuss.php?d=469493"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0049",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470389"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0046",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470386"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0042",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470382"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0039",
      "url": "https://moodle.org/mod/forum/discuss.php?d=469492"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0037",
      "url": "https://moodle.org/mod/forum/discuss.php?d=469490"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0047",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470387"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0043",
      "url": "https://moodle.org/mod/forum/discuss.php?d=470383"
    }
  ]
}

CERTFR-2025-AVI-0519
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection SQL (SQLi) et une falsification de requêtes côté serveur (SSRF).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.4.x antérieures à 4.4.9
Moodle Moodle Moodle versions 4.5.x antérieures à 4.5.5
Moodle Moodle Moodle versions antérieures à 4.1.19
Moodle Moodle Moodle versions 5.0.x antérieures à 5.0.1
References
Bulletin de sécurité Moodle MSA-25-0032 2025-06-17 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0030 2025-06-17 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0031 2025-06-17 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0033 2025-06-17 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0034 2025-06-17 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0035 2025-06-17 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0029 2025-06-17 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0036 2025-06-17 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions 4.4.x ant\u00e9rieures \u00e0 4.4.9 ",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.5.x ant\u00e9rieures \u00e0 4.5.5",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 4.1.19",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 5.0.x ant\u00e9rieures \u00e0 5.0.1",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-49513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49513"
    },
    {
      "name": "CVE-2025-49515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49515"
    },
    {
      "name": "CVE-2025-49514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49514"
    },
    {
      "name": "CVE-2025-49512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49512"
    },
    {
      "name": "CVE-2025-49517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49517"
    },
    {
      "name": "CVE-2025-49516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49516"
    },
    {
      "name": "CVE-2025-49518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49518"
    },
    {
      "name": "CVE-2025-46337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46337"
    }
  ],
  "initial_release_date": "2025-06-18T00:00:00",
  "last_revision_date": "2025-06-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0519",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Injection SQL (SQLi)"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une injection SQL (SQLi) et une falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0032",
      "url": "https://moodle.org/mod/forum/discuss.php?d=468503"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0030",
      "url": "https://moodle.org/mod/forum/discuss.php?d=468501"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0031",
      "url": "https://moodle.org/mod/forum/discuss.php?d=468502"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0033",
      "url": "https://moodle.org/mod/forum/discuss.php?d=468504"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0034",
      "url": "https://moodle.org/mod/forum/discuss.php?d=468505"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0035",
      "url": "https://moodle.org/mod/forum/discuss.php?d=468506"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0029",
      "url": "https://moodle.org/mod/forum/discuss.php?d=468500"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0036",
      "url": "https://moodle.org/mod/forum/discuss.php?d=468507"
    }
  ]
}

CERTFR-2025-AVI-0340
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.3.x antérieures à 4.3.12
Moodle Moodle Moodle versions 4.5.x antérieures à 4.5.4
Moodle Moodle Moodle versions 4.4.x antérieures à 4.4.8
Moodle Moodle Moodle versions antérieures à 4.1.18
References
Bulletin de sécurité Moodle MSA-25-0014 2025-04-20 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0017 2025-04-20 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0027 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0023 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0022 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0013 2025-04-20 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0026 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0015 2025-04-20 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0020 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0024 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0025 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0016 2025-04-20 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0019 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0021 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0028 2025-04-21 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0018 2025-04-21 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions 4.3.x ant\u00e9rieures \u00e0 4.3.12",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.5.x ant\u00e9rieures \u00e0 4.5.4",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.4.x ant\u00e9rieures \u00e0 4.4.8",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 4.1.18",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-3643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3643"
    },
    {
      "name": "CVE-2025-3634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3634"
    },
    {
      "name": "CVE-2025-3641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3641"
    },
    {
      "name": "CVE-2025-3637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3637"
    },
    {
      "name": "CVE-2025-3628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3628"
    },
    {
      "name": "CVE-2025-3647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3647"
    },
    {
      "name": "CVE-2025-3625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3625"
    },
    {
      "name": "CVE-2025-3636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3636"
    },
    {
      "name": "CVE-2025-3642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3642"
    },
    {
      "name": "CVE-2025-3638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3638"
    },
    {
      "name": "CVE-2025-3645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3645"
    },
    {
      "name": "CVE-2024-40446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40446"
    },
    {
      "name": "CVE-2025-3640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3640"
    },
    {
      "name": "CVE-2025-3627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3627"
    },
    {
      "name": "CVE-2025-3644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3644"
    },
    {
      "name": "CVE-2025-3635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3635"
    }
  ],
  "initial_release_date": "2025-04-22T00:00:00",
  "last_revision_date": "2025-04-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0340",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": "2025-04-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0014",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467593"
    },
    {
      "published_at": "2025-04-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0017",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467596"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0027",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467606"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467602"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0022",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467601"
    },
    {
      "published_at": "2025-04-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0013",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467592"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0026",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467605"
    },
    {
      "published_at": "2025-04-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0015",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467594"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0020",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467599"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0024",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467603"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0025",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467604"
    },
    {
      "published_at": "2025-04-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0016",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467595"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0019",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467598"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0021",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467600"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0028",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467607"
    },
    {
      "published_at": "2025-04-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0018",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467597"
    }
  ]
}

CERTFR-2025-AVI-0242
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.4.x antérieures à 4.4.7
Moodle Moodle Moodle versions 4.3.x antérieures à 4.3.11
Moodle Moodle Moodle versions 4.5.x antérieures à 4.5.3
Moodle Moodle Moodle versions antérieures à 4.1.17
References
Bulletin de sécurité Moodle MSA-25-0011 2025-03-26 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0012 2025-03-26 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions 4.4.x ant\u00e9rieures \u00e0 4.4.7",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.3.x ant\u00e9rieures \u00e0 4.3.11 ",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.5.x ant\u00e9rieures \u00e0 4.5.3",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 4.1.17",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "initial_release_date": "2025-03-26T00:00:00",
  "last_revision_date": "2025-03-26T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0242",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0011",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467084"
    },
    {
      "published_at": "2025-03-26",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0012",
      "url": "https://moodle.org/mod/forum/discuss.php?d=467086"
    }
  ]
}

CERTFR-2025-AVI-0138
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.3.x antérieures à 4.3.10
Moodle Moodle Moodle versions 4.1.x antérieures à 4.1.16
Moodle Moodle Moodle versions 4.5.x antérieures à 4.5.2
Moodle Moodle Moodle versions 4.4.x antérieures à 4.4.6
References
Bulletin de sécurité Moodle MSA-25-0006 2025-02-18 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0003 2025-02-18 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0002 2025-02-18 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0004 2025-02-18 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0007 2025-02-18 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0008 2025-02-18 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0009 2025-02-18 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0005 2025-02-18 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0010 2025-02-18 vendor-advisory
Bulletin de sécurité Moodle MSA-25-0001 2025-02-18 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions 4.3.x ant\u00e9rieures \u00e0 4.3.10",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.1.x ant\u00e9rieures \u00e0 4.1.16",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.5.x ant\u00e9rieures \u00e0 4.5.2",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.4.x ant\u00e9rieures \u00e0 4.4.6",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-26528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26528"
    },
    {
      "name": "CVE-2025-26529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26529"
    },
    {
      "name": "CVE-2024-38999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
    },
    {
      "name": "CVE-2025-26527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26527"
    },
    {
      "name": "CVE-2025-26533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26533"
    },
    {
      "name": "CVE-2025-26532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26532"
    },
    {
      "name": "CVE-2025-26530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26530"
    },
    {
      "name": "CVE-2025-26526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26526"
    },
    {
      "name": "CVE-2025-26525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26525"
    },
    {
      "name": "CVE-2025-26531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26531"
    }
  ],
  "initial_release_date": "2025-02-18T00:00:00",
  "last_revision_date": "2025-02-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0138",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0006",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466146"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0003",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466143"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0002",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466142"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0004",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466144"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0007",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466147"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0008",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466148"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0009",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466149"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0005",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466145"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0010",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466150"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-25-0001",
      "url": "https://moodle.org/mod/forum/discuss.php?d=466141"
    }
  ]
}

CERTFR-2024-AVI-1085
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.4.x antérieures à 4.4.5
Moodle Moodle Moodle versions 4.1.x antérieures à 4.1.15
Moodle Moodle Moodle versions 4.5.x antérieures à 4.5.1
Moodle Moodle Moodle versions 4.3.x antérieures à 4.3.9
References
Bulletin de sécurité Moodle MSA-24-0056 2024-12-17 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0052 2024-12-17 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0055 2024-12-17 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0054 2024-12-17 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0053 2024-12-17 vendor-advisory
Bulletin de sécurité Moodle 464554 2024-12-17 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions 4.4.x ant\u00e9rieures \u00e0 4.4.5",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.1.x ant\u00e9rieures \u00e0 4.1.15",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.5.x ant\u00e9rieures \u00e0 4.5.1",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.3.x ant\u00e9rieures \u00e0 4.3.9 ",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-55648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55648"
    },
    {
      "name": "CVE-2024-55644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55644"
    },
    {
      "name": "CVE-2024-55646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55646"
    },
    {
      "name": "CVE-2024-55645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55645"
    },
    {
      "name": "CVE-2024-55643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55643"
    },
    {
      "name": "CVE-2024-55647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55647"
    }
  ],
  "initial_release_date": "2024-12-17T00:00:00",
  "last_revision_date": "2024-12-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1085",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0056",
      "url": "https://moodle.org/mod/forum/discuss.php?d=464559"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0052",
      "url": "https://moodle.org/mod/forum/discuss.php?d=464555"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0055",
      "url": "https://moodle.org/mod/forum/discuss.php?d=464558"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0054",
      "url": "https://moodle.org/mod/forum/discuss.php?d=464557"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0053",
      "url": "https://moodle.org/mod/forum/discuss.php?d=464556"
    },
    {
      "published_at": "2024-12-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle 464554",
      "url": "https://moodle.org/mod/forum/discuss.php?d=464554"
    }
  ]
}

CERTFR-2024-AVI-0876
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.2.x antérieures à 4.2.11
Moodle Moodle Moodle versions 4.4.x antérieures à 4.4.4
Moodle Moodle Moodle versions 4.3.x antérieures à 4.3.8
Moodle Moodle Moodle versions antérieures à 4.1.14
References
Bulletin de sécurité Moodle MSA-24-0045 2024-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0048 2024-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0047 2024-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0046 2024-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0050 2024-10-14 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0049 2024-10-14 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions 4.2.x ant\u00e9rieures \u00e0 4.2.11 ",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.4.x ant\u00e9rieures \u00e0 4.4.4",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.3.x ant\u00e9rieures \u00e0 4.3.8",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 4.1.14",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-48900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48900"
    },
    {
      "name": "CVE-2024-48901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48901"
    },
    {
      "name": "CVE-2024-48898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48898"
    },
    {
      "name": "CVE-2024-48897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48897"
    },
    {
      "name": "CVE-2024-48896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48896"
    },
    {
      "name": "CVE-2024-48899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48899"
    }
  ],
  "initial_release_date": "2024-10-14T00:00:00",
  "last_revision_date": "2024-10-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0876",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0045",
      "url": "https://moodle.org/mod/forum/discuss.php?d=462874"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0048",
      "url": "https://moodle.org/mod/forum/discuss.php?d=462878"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0047",
      "url": "https://moodle.org/mod/forum/discuss.php?d=462877"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0046",
      "url": "https://moodle.org/mod/forum/discuss.php?d=462876"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0050",
      "url": "https://moodle.org/mod/forum/discuss.php?d=462880"
    },
    {
      "published_at": "2024-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0049",
      "url": "https://moodle.org/mod/forum/discuss.php?d=462879"
    }
  ]
}

CERTFR-2024-AVI-0756
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.3.x antérieures à 4.3.7
Moodle Moodle Moodle versions 4.1.x antérieures à 4.1.13
Moodle Moodle Moodle versions 4.4.x antérieures à 4.4.3
Moodle Moodle Moodle versions 4.2.x antérieures à 4.2.10
References
Bulletin de sécurité Moodle MSA-24-0044 2024-09-10 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0043 2024-09-10 vendor-advisory
Bulletin de sécurité Moodle MSA-24-0042 2024-09-10 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions  4.3.x ant\u00e9rieures \u00e0  4.3.7",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.1.x ant\u00e9rieures \u00e0  4.1.13",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions  4.4.x ant\u00e9rieures \u00e0 4.4.3",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions  4.2.x ant\u00e9rieures \u00e0  4.2.10 ",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-45690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45690"
    },
    {
      "name": "CVE-2024-45689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45689"
    },
    {
      "name": "CVE-2024-45691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45691"
    }
  ],
  "initial_release_date": "2024-09-10T00:00:00",
  "last_revision_date": "2024-09-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0756",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0044",
      "url": "https://moodle.org/mod/forum/discuss.php?d=461897"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0043",
      "url": "https://moodle.org/mod/forum/discuss.php?d=461895"
    },
    {
      "published_at": "2024-09-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0042",
      "url": "https://moodle.org/mod/forum/discuss.php?d=461894"
    }
  ]
}

CERTFR-2024-AVI-0149
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Elles permettent à un attaquant de provoquer un déni de service à distance, une injection de requêtes illégitimes par rebond (CSRF) et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.3.x antérieures à 4.3.3
Moodle Moodle Moodle versions antérieures à 4.1.9
Moodle Moodle Moodle versions 4.2.x antérieures à 4.2.6

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions 4.3.x ant\u00e9rieures \u00e0 4.3.3",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 4.1.9",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.2.x ant\u00e9rieures \u00e0 4.2.6",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-25981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25981"
    },
    {
      "name": "CVE-2024-25982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25982"
    },
    {
      "name": "CVE-2024-25979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25979"
    },
    {
      "name": "CVE-2024-25980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25980"
    },
    {
      "name": "CVE-2024-25978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25978"
    },
    {
      "name": "CVE-2024-25983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25983"
    }
  ],
  "initial_release_date": "2024-02-20T00:00:00",
  "last_revision_date": "2024-02-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0149",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMoodle\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, une injection de requ\u00eates\nill\u00e9gitimes par rebond (CSRF) et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0004 du 19 f\u00e9vrier 2024",
      "url": "https://moodle.org/mod/forum/discuss.php?d=455637"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0002 du 19 f\u00e9vrier 2024",
      "url": "https://moodle.org/mod/forum/discuss.php?d=455635"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0006 du 19 f\u00e9vrier 2024",
      "url": "https://moodle.org/mod/forum/discuss.php?d=455641"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0001 du 19 f\u00e9vrier 2024",
      "url": "https://moodle.org/mod/forum/discuss.php?d=455634"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0005 du 19 f\u00e9vrier 2024",
      "url": "https://moodle.org/mod/forum/discuss.php?d=455638"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-24-0003 du 19 f\u00e9vrier 2024",
      "url": "https://moodle.org/mod/forum/discuss.php?d=455636"
    }
  ]
}

CERTFR-2023-AVI-1050
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Moodle Moodle Moodle versions antérieures à 3.9.25
Moodle Moodle Moodle versions 3.11.x antérieures à 3.11.18
Moodle Moodle Moodle versions 4.0.x antérieures à 4.0.12
Moodle Moodle Moodle versions 4.1.x antérieures à 4.1.7
Moodle Moodle Moodle versions 4.2.x antérieures à 4.2.4
Moodle Moodle Moodle versions 4.3.x antérieures à 4.3.1

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 3.9.25",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 3.11.x ant\u00e9rieures \u00e0 3.11.18",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.0.x ant\u00e9rieures \u00e0 4.0.12",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.1.x ant\u00e9rieures \u00e0 4.1.7",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.2.x ant\u00e9rieures \u00e0 4.2.4",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.3.x ant\u00e9rieures \u00e0 4.3.1",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-6662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6662"
    },
    {
      "name": "CVE-2023-6667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6667"
    },
    {
      "name": "CVE-2023-6661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6661"
    },
    {
      "name": "CVE-2023-6663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6663"
    },
    {
      "name": "CVE-2023-6665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6665"
    },
    {
      "name": "CVE-2023-6670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6670"
    },
    {
      "name": "CVE-2023-6666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6666"
    },
    {
      "name": "CVE-2023-6664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6664"
    },
    {
      "name": "CVE-2023-6669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6669"
    },
    {
      "name": "CVE-2023-6668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6668"
    }
  ],
  "initial_release_date": "2023-12-21T00:00:00",
  "last_revision_date": "2023-12-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-1050",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-12-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0053 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453767"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0047 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453761"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0051 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453765"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0049 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453763"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0046 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453760"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0052 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453766"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0048 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453762"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0050 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453764"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0045 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453759"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0044 du 21 d\u00e9cembre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=453758"
    }
  ]
}

CERTFR-2023-AVI-0859
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.2.x antérieures à 4.2.3
Moodle Moodle Moodle versions 4.0.x antérieures à 4.0.11
Moodle Moodle Moodle versions antérieures à 3.9.24
Moodle Moodle Moodle versions 3.11.x antérieures à 3.11.17
Moodle Moodle Moodle versions 4.1.x antérieures à 4.1.6

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions 4.2.x ant\u00e9rieures \u00e0 4.2.3",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.0.x ant\u00e9rieures \u00e0 4.0.11",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 3.9.24",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 3.11.x ant\u00e9rieures \u00e0 3.11.17",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.1.x ant\u00e9rieures \u00e0 4.1.6",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-5549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5549"
    },
    {
      "name": "CVE-2023-5550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5550"
    },
    {
      "name": "CVE-2023-5548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5548"
    },
    {
      "name": "CVE-2023-5551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5551"
    }
  ],
  "initial_release_date": "2023-10-18T00:00:00",
  "last_revision_date": "2023-10-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0859",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-10-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0040 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451589"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0041 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451590"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0043 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451592"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0042 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451591"
    }
  ]
}

CERTFR-2023-AVI-0854
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Moodle. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Moodle Moodle Moodle versions 4.2.x antérieures à 4.2.3
Moodle Moodle Moodle versions 4.0.x antérieures à 4.0.11
Moodle Moodle Moodle versions antérieures à 3.9.24
Moodle Moodle Moodle versions 3.11.x antérieures à 3.11.17
Moodle Moodle Moodle versions 4.1.x antérieures à 4.1.6

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Moodle versions 4.2.x ant\u00e9rieures \u00e0 4.2.3",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.0.x ant\u00e9rieures \u00e0 4.0.11",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions ant\u00e9rieures \u00e0 3.9.24",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 3.11.x ant\u00e9rieures \u00e0 3.11.17",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    },
    {
      "description": "Moodle versions 4.1.x ant\u00e9rieures \u00e0 4.1.6",
      "product": {
        "name": "Moodle",
        "vendor": {
          "name": "Moodle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-5543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5543"
    },
    {
      "name": "CVE-2023-5541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5541"
    },
    {
      "name": "CVE-2023-5544",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5544"
    },
    {
      "name": "CVE-2023-5539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5539"
    },
    {
      "name": "CVE-2023-5540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5540"
    },
    {
      "name": "CVE-2023-5542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5542"
    },
    {
      "name": "CVE-2023-5547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5547"
    },
    {
      "name": "CVE-2023-5545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5545"
    },
    {
      "name": "CVE-2023-5546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5546"
    }
  ],
  "initial_release_date": "2023-10-17T00:00:00",
  "last_revision_date": "2023-10-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0854",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-10-17T00:00:00.000000"
    },
    {
      "description": "La version 3.9.23 est vuln\u00e9rable, la version 3.9.24 ne l\u0027est pas.",
      "revision_date": "2023-10-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Moodle. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Moodle",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0034 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451583"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0033 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451582"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0035 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451584"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0037 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451586"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0036 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451585"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0032 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451581"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0038 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451587"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0039 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451588"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Moodle MSA-23-0031 du 17 octobre 2023",
      "url": "https://moodle.org/mod/forum/discuss.php?d=451580"
    }
  ]
}

CVE-2025-62401 (GCVE-0-2025-62401)
Vulnerability from nvd
Published
2025-10-23 11:29
Modified
2025-10-23 14:39
CWE
Summary
An issue in Moodle’s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Version: 4.1.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62401",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:38:17.781648Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:39:05.405Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.21",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Charles Fulton for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue in Moodle\u2019s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Important"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:29:32.189Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62401"
        },
        {
          "name": "RHBZ#2404434",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404434"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:45:39.393000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: possible to bypass timer in timed assignments",
      "x_redhatCweChain": "CWE-285: Improper Authorization"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62401",
    "datePublished": "2025-10-23T11:29:32.189Z",
    "dateReserved": "2025-10-13T10:12:30.926Z",
    "dateUpdated": "2025-10-23T14:39:05.405Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62400 (GCVE-0-2025-62400)
Vulnerability from nvd
Published
2025-10-23 11:28
Modified
2025-10-23 14:48
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Moodle exposed the names of hidden groups to users who had permission to create calendar events but not to view hidden groups. This could reveal private or restricted group information.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Version: 4.1.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62400",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:48:02.796565Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:48:12.585Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.21",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Robert Toth for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Moodle exposed the names of hidden groups to users who had permission to create calendar events but not to view hidden groups. This could reveal private or restricted group information."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:43.890Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62400"
        },
        {
          "name": "RHBZ#2404433",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404433"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:42:38.973000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: hidden group names visible to event creators",
      "x_redhatCweChain": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62400",
    "datePublished": "2025-10-23T11:28:43.890Z",
    "dateReserved": "2025-10-13T10:12:30.926Z",
    "dateUpdated": "2025-10-23T14:48:12.585Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62399 (GCVE-0-2025-62399)
Vulnerability from nvd
Published
2025-10-23 11:28
Modified
2025-10-23 14:52
CWE
  • CWE-307 - Improper Restriction of Excessive Authentication Attempts
Summary
Moodle’s mobile and web service authentication endpoints did not sufficiently restrict repeated password attempts, making them susceptible to brute-force attacks.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Version: 4.1.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62399",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:51:39.821636Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:52:02.496Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.21",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Petr Skoda for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Moodle\u2019s mobile and web service authentication endpoints did not sufficiently restrict repeated password attempts, making them susceptible to brute-force attacks."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-307",
              "description": "Improper Restriction of Excessive Authentication Attempts",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:39.756Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62399"
        },
        {
          "name": "RHBZ#2404432",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404432"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:36:07.887000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: password brute force risk when mobile/web services enabled",
      "x_redhatCweChain": "CWE-307: Improper Restriction of Excessive Authentication Attempts"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62399",
    "datePublished": "2025-10-23T11:28:39.756Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:52:02.496Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62398 (GCVE-0-2025-62398)
Vulnerability from nvd
Published
2025-10-23 11:28
Modified
2025-10-24 14:11
Severity ?
CWE
  • CWE-287 - Improper Authentication
Summary
A serious authentication flaw allowed attackers with valid credentials to bypass multi-factor authentication under certain conditions, potentially compromising user accounts.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-62398",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:57:39.929765Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-24T14:11:10.931Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Petr Skoda for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A serious authentication flaw allowed attackers with valid credentials to bypass multi-factor authentication under certain conditions, potentially compromising user accounts."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Important"
            },
            "type": "Red Hat severity rating"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:36.897Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62398"
        },
        {
          "name": "RHBZ#2404431",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404431"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:32:51.565000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: possible to bypass mfa",
      "x_redhatCweChain": "CWE-287: Improper Authentication"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62398",
    "datePublished": "2025-10-23T11:28:36.897Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-24T14:11:10.931Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62397 (GCVE-0-2025-62397)
Vulnerability from nvd
Published
2025-10-23 11:28
Modified
2025-10-23 14:12
CWE
  • CWE-209 - Generation of Error Message Containing Sensitive Information
Summary
The router’s inconsistent response to invalid course IDs allowed attackers to infer which course IDs exist, potentially aiding reconnaissance.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62397",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:12:21.754220Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:12:29.386Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Adam Jenkins for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The router\u2019s inconsistent response to invalid course IDs allowed attackers to infer which course IDs exist, potentially aiding reconnaissance."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-209",
              "description": "Generation of Error Message Containing Sensitive Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:33.922Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62397"
        },
        {
          "name": "RHBZ#2404430",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404430"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:28:54.803000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: router produces json instead of 404 error for invalid course id",
      "x_redhatCweChain": "CWE-209: Generation of Error Message Containing Sensitive Information"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62397",
    "datePublished": "2025-10-23T11:28:33.922Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:12:29.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62396 (GCVE-0-2025-62396)
Vulnerability from nvd
Published
2025-10-23 11:28
Modified
2025-10-23 14:13
CWE
  • CWE-548 - Exposure of Information Through Directory Listing
Summary
An error-handling issue in the Moodle router (r.php) could cause the application to display internal directory listings when specific HTTP headers were not properly configured.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62396",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:12:55.991738Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:13:02.325Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Yedidia Klein for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An error-handling issue in the Moodle router (r.php) could cause the application to display internal directory listings when specific HTTP headers were not properly configured."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-548",
              "description": "Exposure of Information Through Directory Listing",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:31.054Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62396"
        },
        {
          "name": "RHBZ#2404429",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404429"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:25:44.556000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: router (r.php) could expose application directories",
      "x_redhatCweChain": "CWE-548: Exposure of Information Through Directory Listing"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62396",
    "datePublished": "2025-10-23T11:28:31.054Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:13:02.325Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62395 (GCVE-0-2025-62395)
Vulnerability from nvd
Published
2025-10-23 11:29
Modified
2025-10-23 14:43
CWE
  • CWE-284 - Improper Access Control
Summary
A flaw in the cohort search web service allowed users with permissions in lower contexts to access cohort information from the system context, revealing restricted administrative data.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Version: 4.1.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62395",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:42:56.823232Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:43:09.806Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.21",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Paul Holden for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw in the cohort search web service allowed users with permissions in lower contexts to access cohort information from the system context, revealing restricted administrative data."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:29:29.299Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62395"
        },
        {
          "name": "RHBZ#2404428",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404428"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:21:14.694000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: external cohort search service leaks system cohort data",
      "x_redhatCweChain": "CWE-284: Improper Access Control"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62395",
    "datePublished": "2025-10-23T11:29:29.299Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:43:09.806Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62394 (GCVE-0-2025-62394)
Vulnerability from nvd
Published
2025-10-23 11:28
Modified
2025-10-23 14:14
CWE
  • CWE-863 - Incorrect Authorization
Summary
Moodle failed to verify enrolment status correctly when sending quiz notifications. As a result, suspended or inactive users might receive quiz-related messages, leaking limited course information.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62394",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:14:03.096825Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:14:11.201Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Philipp Hager for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Moodle failed to verify enrolment status correctly when sending quiz notifications. As a result, suspended or inactive users might receive quiz-related messages, leaking limited course information."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "Incorrect Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:27.990Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62394"
        },
        {
          "name": "RHBZ#2404427",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404427"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:14:42.474000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: quiz notifications sent to suspended participants",
      "x_redhatCweChain": "CWE-863: Incorrect Authorization"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62394",
    "datePublished": "2025-10-23T11:28:27.990Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:14:11.201Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62393 (GCVE-0-2025-62393)
Vulnerability from nvd
Published
2025-10-23 11:28
Modified
2025-10-23 14:18
CWE
  • CWE-284 - Improper Access Control
Summary
A flaw was found in the course overview output function where user access permissions were not fully enforced. This could allow unauthorized users to view information about courses they should not have access to, potentially exposing limited course details.
Impacted products
Vendor Product Version
Version: 5.0.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62393",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:18:24.463589Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:18:34.564Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Dani Palou for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw was found in the course overview output function where user access permissions were not fully enforced. This could allow unauthorized users to view information about courses they should not have access to, potentially exposing limited course details."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T12:08:50.260Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62393"
        },
        {
          "name": "RHBZ#2404426",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404426"
        },
        {
          "url": "https://moodle.org/mod/forum/discuss.php?d=470381"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:00:07.894000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: course access permissions not properly checked in course_output_fragment_course_overview",
      "x_generator": {
        "engine": "cvelib 1.8.0"
      },
      "x_redhatCweChain": "CWE-284: Improper Access Control"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62393",
    "datePublished": "2025-10-23T11:28:25.023Z",
    "dateReserved": "2025-10-13T10:12:30.924Z",
    "dateUpdated": "2025-10-23T14:18:34.564Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62401 (GCVE-0-2025-62401)
Vulnerability from cvelistv5
Published
2025-10-23 11:29
Modified
2025-10-23 14:39
CWE
Summary
An issue in Moodle’s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Version: 4.1.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62401",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:38:17.781648Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:39:05.405Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.21",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Charles Fulton for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue in Moodle\u2019s timed assignment feature allowed students to bypass the time restriction, potentially giving them more time than allowed to complete an assessment."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Important"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:29:32.189Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62401"
        },
        {
          "name": "RHBZ#2404434",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404434"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:45:39.393000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: possible to bypass timer in timed assignments",
      "x_redhatCweChain": "CWE-285: Improper Authorization"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62401",
    "datePublished": "2025-10-23T11:29:32.189Z",
    "dateReserved": "2025-10-13T10:12:30.926Z",
    "dateUpdated": "2025-10-23T14:39:05.405Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62395 (GCVE-0-2025-62395)
Vulnerability from cvelistv5
Published
2025-10-23 11:29
Modified
2025-10-23 14:43
CWE
  • CWE-284 - Improper Access Control
Summary
A flaw in the cohort search web service allowed users with permissions in lower contexts to access cohort information from the system context, revealing restricted administrative data.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Version: 4.1.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62395",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:42:56.823232Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:43:09.806Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.21",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Paul Holden for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw in the cohort search web service allowed users with permissions in lower contexts to access cohort information from the system context, revealing restricted administrative data."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:29:29.299Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62395"
        },
        {
          "name": "RHBZ#2404428",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404428"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:21:14.694000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: external cohort search service leaks system cohort data",
      "x_redhatCweChain": "CWE-284: Improper Access Control"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62395",
    "datePublished": "2025-10-23T11:29:29.299Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:43:09.806Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62400 (GCVE-0-2025-62400)
Vulnerability from cvelistv5
Published
2025-10-23 11:28
Modified
2025-10-23 14:48
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Moodle exposed the names of hidden groups to users who had permission to create calendar events but not to view hidden groups. This could reveal private or restricted group information.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Version: 4.1.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62400",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:48:02.796565Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:48:12.585Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.21",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Robert Toth for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Moodle exposed the names of hidden groups to users who had permission to create calendar events but not to view hidden groups. This could reveal private or restricted group information."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:43.890Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62400"
        },
        {
          "name": "RHBZ#2404433",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404433"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:42:38.973000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: hidden group names visible to event creators",
      "x_redhatCweChain": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62400",
    "datePublished": "2025-10-23T11:28:43.890Z",
    "dateReserved": "2025-10-13T10:12:30.926Z",
    "dateUpdated": "2025-10-23T14:48:12.585Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62399 (GCVE-0-2025-62399)
Vulnerability from cvelistv5
Published
2025-10-23 11:28
Modified
2025-10-23 14:52
CWE
  • CWE-307 - Improper Restriction of Excessive Authentication Attempts
Summary
Moodle’s mobile and web service authentication endpoints did not sufficiently restrict repeated password attempts, making them susceptible to brute-force attacks.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Version: 4.1.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62399",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:51:39.821636Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:52:02.496Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.1.21",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Petr Skoda for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Moodle\u2019s mobile and web service authentication endpoints did not sufficiently restrict repeated password attempts, making them susceptible to brute-force attacks."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-307",
              "description": "Improper Restriction of Excessive Authentication Attempts",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:39.756Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62399"
        },
        {
          "name": "RHBZ#2404432",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404432"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:36:07.887000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: password brute force risk when mobile/web services enabled",
      "x_redhatCweChain": "CWE-307: Improper Restriction of Excessive Authentication Attempts"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62399",
    "datePublished": "2025-10-23T11:28:39.756Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:52:02.496Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62398 (GCVE-0-2025-62398)
Vulnerability from cvelistv5
Published
2025-10-23 11:28
Modified
2025-10-24 14:11
Severity ?
CWE
  • CWE-287 - Improper Authentication
Summary
A serious authentication flaw allowed attackers with valid credentials to bypass multi-factor authentication under certain conditions, potentially compromising user accounts.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Version: 4.4.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-62398",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:57:39.929765Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-24T14:11:10.931Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.4.11",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Petr Skoda for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A serious authentication flaw allowed attackers with valid credentials to bypass multi-factor authentication under certain conditions, potentially compromising user accounts."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Important"
            },
            "type": "Red Hat severity rating"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "Improper Authentication",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:36.897Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62398"
        },
        {
          "name": "RHBZ#2404431",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404431"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:32:51.565000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: possible to bypass mfa",
      "x_redhatCweChain": "CWE-287: Improper Authentication"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62398",
    "datePublished": "2025-10-23T11:28:36.897Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-24T14:11:10.931Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62397 (GCVE-0-2025-62397)
Vulnerability from cvelistv5
Published
2025-10-23 11:28
Modified
2025-10-23 14:12
CWE
  • CWE-209 - Generation of Error Message Containing Sensitive Information
Summary
The router’s inconsistent response to invalid course IDs allowed attackers to infer which course IDs exist, potentially aiding reconnaissance.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62397",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:12:21.754220Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:12:29.386Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Adam Jenkins for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The router\u2019s inconsistent response to invalid course IDs allowed attackers to infer which course IDs exist, potentially aiding reconnaissance."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-209",
              "description": "Generation of Error Message Containing Sensitive Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:33.922Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62397"
        },
        {
          "name": "RHBZ#2404430",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404430"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:28:54.803000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: router produces json instead of 404 error for invalid course id",
      "x_redhatCweChain": "CWE-209: Generation of Error Message Containing Sensitive Information"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62397",
    "datePublished": "2025-10-23T11:28:33.922Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:12:29.386Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62396 (GCVE-0-2025-62396)
Vulnerability from cvelistv5
Published
2025-10-23 11:28
Modified
2025-10-23 14:13
CWE
  • CWE-548 - Exposure of Information Through Directory Listing
Summary
An error-handling issue in the Moodle router (r.php) could cause the application to display internal directory listings when specific HTTP headers were not properly configured.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62396",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:12:55.991738Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:13:02.325Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Yedidia Klein for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "An error-handling issue in the Moodle router (r.php) could cause the application to display internal directory listings when specific HTTP headers were not properly configured."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-548",
              "description": "Exposure of Information Through Directory Listing",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:31.054Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62396"
        },
        {
          "name": "RHBZ#2404429",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404429"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:25:44.556000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: router (r.php) could expose application directories",
      "x_redhatCweChain": "CWE-548: Exposure of Information Through Directory Listing"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62396",
    "datePublished": "2025-10-23T11:28:31.054Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:13:02.325Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62394 (GCVE-0-2025-62394)
Vulnerability from cvelistv5
Published
2025-10-23 11:28
Modified
2025-10-23 14:14
CWE
  • CWE-863 - Incorrect Authorization
Summary
Moodle failed to verify enrolment status correctly when sending quiz notifications. As a result, suspended or inactive users might receive quiz-related messages, leaking limited course information.
References
Impacted products
Vendor Product Version
Version: 5.0.0   
Version: 4.5.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62394",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:14:03.096825Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:14:11.201Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "4.5.7",
              "status": "affected",
              "version": "4.5.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Philipp Hager for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Moodle failed to verify enrolment status correctly when sending quiz notifications. As a result, suspended or inactive users might receive quiz-related messages, leaking limited course information."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "Incorrect Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T11:28:27.990Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62394"
        },
        {
          "name": "RHBZ#2404427",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404427"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:14:42.474000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: quiz notifications sent to suspended participants",
      "x_redhatCweChain": "CWE-863: Incorrect Authorization"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62394",
    "datePublished": "2025-10-23T11:28:27.990Z",
    "dateReserved": "2025-10-13T10:12:30.925Z",
    "dateUpdated": "2025-10-23T14:14:11.201Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-62393 (GCVE-0-2025-62393)
Vulnerability from cvelistv5
Published
2025-10-23 11:28
Modified
2025-10-23 14:18
CWE
  • CWE-284 - Improper Access Control
Summary
A flaw was found in the course overview output function where user access permissions were not fully enforced. This could allow unauthorized users to view information about courses they should not have access to, potentially exposing limited course details.
Impacted products
Vendor Product Version
Version: 5.0.0   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-62393",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-23T14:18:24.463589Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-23T14:18:34.564Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://git.moodle.org",
          "defaultStatus": "unaffected",
          "packageName": "moodle",
          "versions": [
            {
              "lessThan": "5.0.3",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Dani Palou for reporting this issue."
        }
      ],
      "datePublic": "2025-10-14T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw was found in the course overview output function where user access permissions were not fully enforced. This could allow unauthorized users to view information about courses they should not have access to, potentially exposing limited course details."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Moderate"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-23T12:08:50.260Z",
        "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
        "shortName": "fedora"
      },
      "references": [
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2025-62393"
        },
        {
          "name": "RHBZ#2404426",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404426"
        },
        {
          "url": "https://moodle.org/mod/forum/discuss.php?d=470381"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-10-16T14:00:07.894000+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2025-10-14T04:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Moodle: course access permissions not properly checked in course_output_fragment_course_overview",
      "x_generator": {
        "engine": "cvelib 1.8.0"
      },
      "x_redhatCweChain": "CWE-284: Improper Access Control"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
    "assignerShortName": "fedora",
    "cveId": "CVE-2025-62393",
    "datePublished": "2025-10-23T11:28:25.023Z",
    "dateReserved": "2025-10-13T10:12:30.924Z",
    "dateUpdated": "2025-10-23T14:18:34.564Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}