Untriaged
Permalink
CVE-2025-67848
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package moodle-dl
Moodle: moodle: authentication bypass via lti provider allows suspended users to gain unauthorized access.
A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the user's suspension status, enabling unauthorized access to the system. This can lead to information disclosure or other unauthorized actions by users who should be restricted.
References
- https://access.redhat.com/security/cve/CVE-2025-67848 x_refsource_REDHAT vdb-entry
- RHBZ#2423831 issue-tracking x_refsource_REDHAT
- https://moodle.org/mod/forum/discuss.php?d=471298
- https://access.redhat.com/security/cve/CVE-2025-67848 x_refsource_REDHAT vdb-entry
- RHBZ#2423831 issue-tracking x_refsource_REDHAT
- https://moodle.org/mod/forum/discuss.php?d=471298
Affected products
moodle
- <5.1.1
- <5.0.4
- <4.5.8
- <4.1.22
- <4.4.12
Package maintainers
-
@freezeboy freezeboy