Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2025-0390
Vulnerability from csaf_certbund - Published: 2025-02-17 23:00 - Updated: 2025-02-17 23:00Summary
Moodle: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Moodle ist ein Software-Paket, um internetbasierte Kurse zu entwickeln und durchzuführen. Es ist ein globales Softwareentwicklungsprojekt, das einen konstruktivistischen Lehr- und Lernansatz unterstützt.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Moodle ausnutzen, um SQL-Injection- und Cross-Site-Scripting-Angriffe durchzuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen preiszugeben oder andere nicht näher spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Moodle ist ein Software-Paket, um internetbasierte Kurse zu entwickeln und durchzuf\u00fchren. Es ist ein globales Softwareentwicklungsprojekt, das einen konstruktivistischen Lehr- und Lernansatz unterst\u00fctzt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Moodle ausnutzen, um SQL-Injection- und Cross-Site-Scripting-Angriffe durchzuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen preiszugeben oder andere nicht n\u00e4her spezifizierte Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0390 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0390.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0390 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0390"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466141"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466142"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466143"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466144"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466145"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466146"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466147"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466148"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466149"
},
{
"category": "external",
"summary": "Moodle Security announcements vom 2025-02-17",
"url": "https://moodle.org/mod/forum/discuss.php?d=466150"
}
],
"source_lang": "en-US",
"title": "Moodle: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-02-17T23:00:00.000+00:00",
"generator": {
"date": "2025-02-18T09:05:40.445+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0390",
"initial_release_date": "2025-02-17T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-02-17T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c4.5.2",
"product": {
"name": "Open Source Moodle \u003c4.5.2",
"product_id": "T041249"
}
},
{
"category": "product_version",
"name": "4.5.2",
"product": {
"name": "Open Source Moodle 4.5.2",
"product_id": "T041249-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:moodle:4.5.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c4.4.6",
"product": {
"name": "Open Source Moodle \u003c4.4.6",
"product_id": "T041250"
}
},
{
"category": "product_version",
"name": "4.4.6",
"product": {
"name": "Open Source Moodle 4.4.6",
"product_id": "T041250-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:moodle:4.4.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003c4.3.10",
"product": {
"name": "Open Source Moodle \u003c4.3.10",
"product_id": "T041251"
}
},
{
"category": "product_version",
"name": "4.3.10",
"product": {
"name": "Open Source Moodle 4.3.10",
"product_id": "T041251-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:moodle:4.3.10"
}
}
},
{
"category": "product_version_range",
"name": "\u003c4.1.16",
"product": {
"name": "Open Source Moodle \u003c4.1.16",
"product_id": "T041252"
}
},
{
"category": "product_version",
"name": "4.1.16",
"product": {
"name": "Open Source Moodle 4.1.16",
"product_id": "T041252-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:moodle:4.1.16"
}
}
}
],
"category": "product_name",
"name": "Moodle"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-26525",
"product_status": {
"known_affected": [
"T041252",
"T041251",
"T041250",
"T041249"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2025-26525"
},
{
"cve": "CVE-2025-26526",
"product_status": {
"known_affected": [
"T041252",
"T041251",
"T041250",
"T041249"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2025-26526"
},
{
"cve": "CVE-2025-26527",
"product_status": {
"known_affected": [
"T041252",
"T041251",
"T041250",
"T041249"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2025-26527"
},
{
"cve": "CVE-2025-26528",
"product_status": {
"known_affected": [
"T041252",
"T041251",
"T041250",
"T041249"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2025-26528"
},
{
"cve": "CVE-2025-26529",
"product_status": {
"known_affected": [
"T041252",
"T041251",
"T041250",
"T041249"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2025-26529"
},
{
"cve": "CVE-2025-26530",
"product_status": {
"known_affected": [
"T041252",
"T041251",
"T041250",
"T041249"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2025-26530"
},
{
"cve": "CVE-2025-26531",
"product_status": {
"known_affected": [
"T041252",
"T041251",
"T041250",
"T041249"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2025-26531"
},
{
"cve": "CVE-2025-26532",
"product_status": {
"known_affected": [
"T041252",
"T041251",
"T041250",
"T041249"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2025-26532"
},
{
"cve": "CVE-2025-26533",
"product_status": {
"known_affected": [
"T041252",
"T041251",
"T041250",
"T041249"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2025-26533"
}
]
}
CVE-2025-26528 (GCVE-0-2025-26528)
Vulnerability from cvelistv5 – Published: 2025-02-24 19:50 – Updated: 2025-02-24 20:13
VLAI?
EPSS
Title
Stored XSS in ddimageortext question type
Summary
The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.
Severity ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moodle Project | moodle |
Affected:
4.5.0 , < 4.5.2
(semver)
Affected: 4.4.0 , < 4.4.6 (semver) Affected: 4.3.0 , < 4.3.10 (semver) Affected: 4.1.0 , < 4.1.16 (semver) Unknown: 4.2.0 , < 4.2.* (semver) Unknown: 0 , < 4.0.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26528",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-24T20:03:52.892987Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:04:22.319Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "moodle",
"vendor": "Moodle Project",
"versions": [
{
"lessThan": "4.5.2",
"status": "affected",
"version": "4.5.0",
"versionType": "semver"
},
{
"lessThan": "4.4.6",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThan": "4.3.10",
"status": "affected",
"version": "4.3.0",
"versionType": "semver"
},
{
"lessThan": "4.1.16",
"status": "affected",
"version": "4.1.0",
"versionType": "semver"
},
{
"lessThan": "4.2.*",
"status": "unknown",
"version": "4.2.0",
"versionType": "semver"
},
{
"lessThan": "4.0.*",
"status": "unknown",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-18T05:38:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk."
}
],
"value": "The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:13:02.785Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=466144"
},
{
"tags": [
"patch"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-82896"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Stored XSS in ddimageortext question type",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2025-26528",
"datePublished": "2025-02-24T19:50:11.812Z",
"dateReserved": "2025-02-12T13:29:39.336Z",
"dateUpdated": "2025-02-24T20:13:02.785Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26527 (GCVE-0-2025-26527)
Vulnerability from cvelistv5 – Published: 2025-02-24 19:44 – Updated: 2025-02-24 20:12
VLAI?
EPSS
Title
Non-searchable tags can still be discovered on the tag search page and in the tags block
Summary
Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.
Severity ?
5.3 (Medium)
CWE
- CWE-1230 - Exposure of Sensitive Information Through Metadata
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moodle Project | moodle |
Affected:
4.5.0 , < 4.5.2
(semver)
Affected: 4.4.0 , < 4.4.6 (semver) Affected: 4.3.0 , < 4.3.10 (semver) Affected: 4.1.0 , < 4.1.16 (semver) Unknown: 4.2.0 , < 4.2.* (semver) Unknown: 0 , < 4.0.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26527",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-24T19:57:30.268527Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T19:58:10.505Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "moodle",
"vendor": "Moodle Project",
"versions": [
{
"lessThan": "4.5.2",
"status": "affected",
"version": "4.5.0",
"versionType": "semver"
},
{
"lessThan": "4.4.6",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThan": "4.3.10",
"status": "affected",
"version": "4.3.0",
"versionType": "semver"
},
{
"lessThan": "4.1.16",
"status": "affected",
"version": "4.1.0",
"versionType": "semver"
},
{
"lessThan": "4.2.*",
"status": "unknown",
"version": "4.2.0",
"versionType": "semver"
},
{
"lessThan": "4.0.*",
"status": "unknown",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-18T05:38:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block."
}
],
"value": "Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1230",
"description": "CWE-1230 Exposure of Sensitive Information Through Metadata",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:12:14.116Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=466143"
},
{
"tags": [
"patch"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-83941"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Non-searchable tags can still be discovered on the tag search page and in the tags block",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2025-26527",
"datePublished": "2025-02-24T19:44:06.228Z",
"dateReserved": "2025-02-12T13:29:39.336Z",
"dateUpdated": "2025-02-24T20:12:14.116Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26525 (GCVE-0-2025-26525)
Vulnerability from cvelistv5 – Published: 2025-02-24 19:31 – Updated: 2025-02-24 20:10
VLAI?
EPSS
Title
Arbitrary file read risk through pdfTeX
Summary
Insufficient sanitizing in the TeX notation filter resulted in an
arbitrary file read risk on sites where pdfTeX is available (such as
those with TeX Live installed).
Severity ?
8.6 (High)
CWE
- CWE-552 - Files or Directories Accessible to External Parties
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moodle Project | moodle |
Affected:
4.5.0 , < 4.5.2
(semver)
Affected: 4.4.0 , < 4.4.6 (semver) Affected: 4.3.0 , < 4.3.10 (semver) Affected: 4.1.0 , < 4.1.16 (semver) Unknown: 4.2.0 , < 4.2.* (semver) Unknown: 0 , < 4.0.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26525",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-24T19:59:34.025897Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T19:59:42.712Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "moodle",
"vendor": "Moodle Project",
"versions": [
{
"lessThan": "4.5.2",
"status": "affected",
"version": "4.5.0",
"versionType": "semver"
},
{
"lessThan": "4.4.6",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThan": "4.3.10",
"status": "affected",
"version": "4.3.0",
"versionType": "semver"
},
{
"lessThan": "4.1.16",
"status": "affected",
"version": "4.1.0",
"versionType": "semver"
},
{
"lessThan": "4.2.*",
"status": "unknown",
"version": "4.2.0",
"versionType": "semver"
},
{
"lessThan": "4.0.*",
"status": "unknown",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-18T05:37:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Insufficient sanitizing in the TeX notation filter resulted in an \narbitrary file read risk on sites where pdfTeX is available (such as \nthose with TeX Live installed)."
}
],
"value": "Insufficient sanitizing in the TeX notation filter resulted in an \narbitrary file read risk on sites where pdfTeX is available (such as \nthose with TeX Live installed)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-552",
"description": "CWE-552 Files or Directories Accessible to External Parties",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:10:27.216Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=466141"
},
{
"tags": [
"patch"
],
"url": "https://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-84136"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Arbitrary file read risk through pdfTeX",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2025-26525",
"datePublished": "2025-02-24T19:31:43.881Z",
"dateReserved": "2025-02-12T13:29:39.335Z",
"dateUpdated": "2025-02-24T20:10:27.216Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26526 (GCVE-0-2025-26526)
Vulnerability from cvelistv5 – Published: 2025-02-24 19:39 – Updated: 2025-02-24 20:11
VLAI?
EPSS
Title
Feedback response viewing and deletions did not respect Separate Groups mode
Summary
Separate Groups mode restrictions were not factored into permission
checks before allowing viewing or deletion of responses in Feedback
activities.
Severity ?
6.5 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moodle Project | moodle |
Affected:
4.5.0 , < 4.5.2
(semver)
Affected: 4.4.0 , < 4.4.6 (semver) Affected: 4.3.0 , < 4.3.10 (semver) Affected: 4.1.0 , < 4.1.16 (semver) Unknown: 4.2.0 , < 4.2.* (semver) Unknown: 0 , < 4.0.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26526",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-24T19:58:41.267874Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T19:58:53.747Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "moodle",
"vendor": "Moodle Project",
"versions": [
{
"lessThan": "4.5.2",
"status": "affected",
"version": "4.5.0",
"versionType": "semver"
},
{
"lessThan": "4.4.6",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThan": "4.3.10",
"status": "affected",
"version": "4.3.0",
"versionType": "semver"
},
{
"lessThan": "4.1.16",
"status": "affected",
"version": "4.1.0",
"versionType": "semver"
},
{
"lessThan": "4.2.*",
"status": "unknown",
"version": "4.2.0",
"versionType": "semver"
},
{
"lessThan": "4.0.*",
"status": "unknown",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-18T05:38:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Separate Groups mode restrictions were not factored into permission \nchecks before allowing viewing or deletion of responses in Feedback \nactivities."
}
],
"value": "Separate Groups mode restrictions were not factored into permission \nchecks before allowing viewing or deletion of responses in Feedback \nactivities."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:11:24.973Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=466142"
},
{
"tags": [
"patch"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-79976"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Feedback response viewing and deletions did not respect Separate Groups mode",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2025-26526",
"datePublished": "2025-02-24T19:39:23.646Z",
"dateReserved": "2025-02-12T13:29:39.335Z",
"dateUpdated": "2025-02-24T20:11:24.973Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26529 (GCVE-0-2025-26529)
Vulnerability from cvelistv5 – Published: 2025-02-24 19:52 – Updated: 2025-02-24 20:14
VLAI?
EPSS
Title
Stored XSS risk in admin live log
Summary
Description information displayed in the site administration live log
required additional sanitizing to prevent a stored XSS risk.
Severity ?
8.3 (High)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moodle Project | moodle |
Affected:
4.5.0 , < 4.5.2
(semver)
Affected: 4.4.0 , < 4.4.6 (semver) Affected: 4.3.0 , < 4.3.10 (semver) Affected: 4.1.0 , < 4.1.16 (semver) Unknown: 4.2.0 , < 4.2.* (semver) Unknown: 0 , < 4.0.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26529",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-24T20:05:38.160784Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:07:14.809Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "moodle",
"vendor": "Moodle Project",
"versions": [
{
"lessThan": "4.5.2",
"status": "affected",
"version": "4.5.0",
"versionType": "semver"
},
{
"lessThan": "4.4.6",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThan": "4.3.10",
"status": "affected",
"version": "4.3.0",
"versionType": "semver"
},
{
"lessThan": "4.1.16",
"status": "affected",
"version": "4.1.0",
"versionType": "semver"
},
{
"lessThan": "4.2.*",
"status": "unknown",
"version": "4.2.0",
"versionType": "semver"
},
{
"lessThan": "4.0.*",
"status": "unknown",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-18T05:38:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Description information displayed in the site administration live log \nrequired additional sanitizing to prevent a stored XSS risk."
}
],
"value": "Description information displayed in the site administration live log \nrequired additional sanitizing to prevent a stored XSS risk."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:14:08.198Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=466145"
},
{
"tags": [
"patch"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-84145"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Stored XSS risk in admin live log",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2025-26529",
"datePublished": "2025-02-24T19:52:48.821Z",
"dateReserved": "2025-02-12T13:29:39.336Z",
"dateUpdated": "2025-02-24T20:14:08.198Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26530 (GCVE-0-2025-26530)
Vulnerability from cvelistv5 – Published: 2025-02-24 19:56 – Updated: 2025-02-24 20:06
VLAI?
EPSS
Title
Reflected XSS via question bank filter
Summary
The question bank filter required additional sanitizing to prevent a reflected XSS risk.
Severity ?
8.3 (High)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moodle Project | moodle |
Affected:
4.5.0 , < 4.5.2
(semver)
Affected: 4.4.0 , < 4.4.6 (semver) Affected: 4.3.0 , < 4.3.10 (semver) Unknown: 0 , < 4.2.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26530",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-24T20:05:56.789340Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:06:40.986Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "moodle",
"vendor": "Moodle Project",
"versions": [
{
"lessThan": "4.5.2",
"status": "affected",
"version": "4.5.0",
"versionType": "semver"
},
{
"lessThan": "4.4.6",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThan": "4.3.10",
"status": "affected",
"version": "4.3.0",
"versionType": "semver"
},
{
"lessThan": "4.2.*",
"status": "unknown",
"version": "0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-18T05:39:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The question bank filter required additional sanitizing to prevent a reflected XSS risk."
}
],
"value": "The question bank filter required additional sanitizing to prevent a reflected XSS risk."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T19:56:14.586Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=466146"
},
{
"tags": [
"patch"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-84146"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Reflected XSS via question bank filter",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2025-26530",
"datePublished": "2025-02-24T19:56:14.586Z",
"dateReserved": "2025-02-12T13:29:39.336Z",
"dateUpdated": "2025-02-24T20:06:40.986Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26532 (GCVE-0-2025-26532)
Vulnerability from cvelistv5 – Published: 2025-02-24 20:05 – Updated: 2025-02-25 14:19
VLAI?
EPSS
Title
Teachers can evade trusttext config when restoring glossary entries
Summary
Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored.
Severity ?
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moodle Project | moodle |
Affected:
4.5.0 , < 4.5.2
(semver)
Affected: 4.4.0 , < 4.4.6 (semver) Affected: 4.3.0 , < 4.3.10 (semver) Affected: 4.1.0 , < 4.1.16 (semver) Unknown: 0 , < 4.0.* (semver) Unknown: 4.2.0 , < 4.2.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26532",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-25T14:19:04.443547Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-25T14:19:13.124Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "moodle",
"vendor": "Moodle Project",
"versions": [
{
"lessThan": "4.5.2",
"status": "affected",
"version": "4.5.0",
"versionType": "semver"
},
{
"lessThan": "4.4.6",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThan": "4.3.10",
"status": "affected",
"version": "4.3.0",
"versionType": "semver"
},
{
"lessThan": "4.1.16",
"status": "affected",
"version": "4.1.0",
"versionType": "semver"
},
{
"lessThan": "4.0.*",
"status": "unknown",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "4.2.*",
"status": "unknown",
"version": "4.2.0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-18T05:40:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored."
}
],
"value": "Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:05:21.153Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=466149"
},
{
"tags": [
"patch"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-84003"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Teachers can evade trusttext config when restoring glossary entries",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2025-26532",
"datePublished": "2025-02-24T20:05:21.153Z",
"dateReserved": "2025-02-12T13:29:39.337Z",
"dateUpdated": "2025-02-25T14:19:13.124Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26531 (GCVE-0-2025-26531)
Vulnerability from cvelistv5 – Published: 2025-02-24 20:02 – Updated: 2025-02-25 14:19
VLAI?
EPSS
Title
IDOR in badges allows disabling of arbitrary badges
Summary
Insufficient capability checks made it possible to disable badges a user does not have permission to access.
Severity ?
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moodle Project | moodle |
Affected:
4.5.0 , < 4.5.2
(semver)
Affected: 4.4.0 , < 4.4.6 (semver) Affected: 4.3.0 , < 4.3.10 (semver) Affected: 4.1.0 , < 4.1.16 (semver) Unknown: 0 , < 4.0.* (semver) Unknown: 4.2.0 , < 4.2.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26531",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-25T14:19:42.478063Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-25T14:19:51.530Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "moodle",
"vendor": "Moodle Project",
"versions": [
{
"lessThan": "4.5.2",
"status": "affected",
"version": "4.5.0",
"versionType": "semver"
},
{
"lessThan": "4.4.6",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThan": "4.3.10",
"status": "affected",
"version": "4.3.0",
"versionType": "semver"
},
{
"lessThan": "4.1.16",
"status": "affected",
"version": "4.1.0",
"versionType": "semver"
},
{
"lessThan": "4.0.*",
"status": "unknown",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "4.2.*",
"status": "unknown",
"version": "4.2.0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-18T05:40:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Insufficient capability checks made it possible to disable badges a user does not have permission to access."
}
],
"value": "Insufficient capability checks made it possible to disable badges a user does not have permission to access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:02:57.732Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=466148"
},
{
"tags": [
"patch"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-84239"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "IDOR in badges allows disabling of arbitrary badges",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2025-26531",
"datePublished": "2025-02-24T20:02:57.732Z",
"dateReserved": "2025-02-12T13:29:39.337Z",
"dateUpdated": "2025-02-25T14:19:51.530Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26533 (GCVE-0-2025-26533)
Vulnerability from cvelistv5 – Published: 2025-02-24 20:07 – Updated: 2025-02-25 14:35
VLAI?
EPSS
Title
SQL injection risk in course search module list filter
Summary
An SQL injection risk was identified in the module list filter within course search.
Severity ?
8.1 (High)
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Moodle Project | moodle |
Affected:
4.5.0 , < 4.5.2
(semver)
Affected: 4.4.0 , < 4.4.6 (semver) Affected: 4.3.0 , < 4.3.10 (semver) Affected: 4.1.0 , < 4.1.16 (semver) Unknown: 0 , < 4.0.* (semver) Unknown: 4.2.0 , < 4.2.* (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26533",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-25T14:35:13.711277Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-25T14:35:34.040Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "moodle",
"vendor": "Moodle Project",
"versions": [
{
"lessThan": "4.5.2",
"status": "affected",
"version": "4.5.0",
"versionType": "semver"
},
{
"lessThan": "4.4.6",
"status": "affected",
"version": "4.4.0",
"versionType": "semver"
},
{
"lessThan": "4.3.10",
"status": "affected",
"version": "4.3.0",
"versionType": "semver"
},
{
"lessThan": "4.1.16",
"status": "affected",
"version": "4.1.0",
"versionType": "semver"
},
{
"lessThan": "4.0.*",
"status": "unknown",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "4.2.*",
"status": "unknown",
"version": "4.2.0",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-18T05:41:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An SQL injection risk was identified in the module list filter within course search."
}
],
"value": "An SQL injection risk was identified in the module list filter within course search."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-24T20:07:44.582Z",
"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"shortName": "fedora"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=466150"
},
{
"tags": [
"patch"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-84271"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "SQL injection risk in course search module list filter",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5",
"assignerShortName": "fedora",
"cveId": "CVE-2025-26533",
"datePublished": "2025-02-24T20:07:44.582Z",
"dateReserved": "2025-02-12T13:29:39.337Z",
"dateUpdated": "2025-02-25T14:35:34.040Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…