Summary
Detail | |||
---|---|---|---|
Vendor | Moodle | First view | 2014-07-29 |
Product | Moodle | Last view | 2025-04-25 |
Version | 2.7.0 | Type | Application |
Update | - | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:moodle:moodle |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
0 | 2025-04-25 | CVE-2025-3647 | A flaw was discovered in Moodle. Additional checks were required to ensure that users can only access cohort data they are authorized to retrieve. |
0 | 2025-04-25 | CVE-2025-3645 | A flaw was found in Moodle. Insufficient capability checks in a messaging web service allowed users to view other users' names and online statuses. |
0 | 2025-04-25 | CVE-2025-3644 | A flaw was found in Moodle. Additional checks were required to prevent users from deleting course sections they did not have permission to modify. |
0 | 2025-04-25 | CVE-2025-3643 | A flaw was found in Moodle. The return URL in the policy tool required additional sanitizing to prevent a reflected Cross-site scripting (XSS) risk. |
0 | 2025-04-25 | CVE-2025-3642 | A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default, this was only available to teachers and managers on sites with the EQUELLA repository enabled. |
0 | 2025-04-25 | CVE-2025-3641 | A flaw was found in Moodle. A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default, this was only available to teachers and managers on sites with the Dropbox repository enabled. |
0 | 2025-04-25 | CVE-2025-3640 | A flaw was found in Moodle. Insufficient capability checks made it possible for a user enrolled in a course to access some details, such as the full name and profile image URL, of other users they did not have permission to access. |
0 | 2025-04-25 | CVE-2025-3638 | A flaw was found in Moodle. The analysis request action in the Brickfield tool did not include the necessary token to prevent a Cross-site request forgery (CSRF) risk. |
0 | 2025-04-25 | CVE-2025-3637 | A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages. |
0 | 2025-04-25 | CVE-2025-3636 | A flaw was found in Moodle. This vulnerability allows unauthorized users to access and view RSS feeds due to insufficient capability checks. |
0 | 2025-04-25 | CVE-2025-3635 | A security vulnerability was discovered in Moodle that allows anyone to duplicate existing tours without needing to log in due to a lack of protection against cross-site request forgery (CSRF) attacks. |
0 | 2025-04-25 | CVE-2025-3634 | A security vulnerability was discovered in Moodle that allows students to enroll themselves in courses without completing all the necessary safety checks. Specifically, users can sign up for courses prematurely, even if they haven't finished two-step verification processes. |
0 | 2025-04-25 | CVE-2025-3628 | A flaw has was found in Moodle where anonymous assignment submissions can be de-anonymized via search, revealing student identities. |
0 | 2025-04-25 | CVE-2025-3627 | A security vulnerability was discovered in Moodle that allows some users to access sensitive information about other students before they finish verifying their identities using two-factor authentication (2FA). |
0 | 2025-04-25 | CVE-2025-3625 | A security vulnerability was discovered in Moodle that can allow hackers to gain access to sensitive information about students and prevent them from logging into their accounts, even after they had completed two-factor authentication (2FA). |
0 | 2025-04-25 | CVE-2025-32045 | A flaw has been identified in Moodle where insufficient capability checks in certain grade reports allowed users without the necessary permissions to access hidden grades. |
0 | 2025-04-25 | CVE-2025-32044 | A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data—including names, contact information, and hashed passwords—via stack traces returned by specific API calls. Sites with PHP configured with zend.exception_ignore_args = 1 in the php.ini file are not affected by this vulnerability. |
0 | 2024-11-20 | CVE-2024-48899 | A vulnerability was found in Moodle. Additional checks are required to ensure users can only fetch the list of course badges for courses that they are intended to have access to. |
0 | 2024-11-20 | CVE-2024-45691 | A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to "magic hash" values. |
0 | 2024-11-20 | CVE-2024-45690 | A flaw was found in Moodle. Additional checks were required to ensure users can only delete their OAuth2-linked accounts. |
0 | 2024-11-20 | CVE-2024-45689 | A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access. |
4.3 | 2024-11-18 | CVE-2024-48901 | A vulnerability was found in Moodle. Additional checks are required to ensure users can only access the schedule of a report if they have permission to edit that report. |
4.3 | 2024-11-18 | CVE-2024-48898 | A vulnerability was found in Moodle. Users with access to delete audiences from reports could delete audiences from other reports that they do not have permission to delete from. |
4.3 | 2024-11-18 | CVE-2024-48897 | A vulnerability was found in Moodle. Additional checks are required to ensure users can only edit or delete RSS feeds that they have permission to modify. |
4.3 | 2024-11-18 | CVE-2024-48896 | A vulnerability was found in Moodle. It is possible for users with the "send message" capability to view other users' names that they may not otherwise have access to via an error message in Messaging. Note: The name returned follows the full name format configured on the site. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
26% (55) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
12% (26) | CWE-200 | Information Exposure |
11% (24) | CWE-264 | Permissions, Privileges, and Access Controls |
9% (20) | CWE-352 | Cross-Site Request Forgery (CSRF) |
5% (12) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
3% (8) | CWE-20 | Improper Input Validation |
3% (7) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
2% (6) | CWE-668 | Exposure of Resource to Wrong Sphere |
2% (6) | CWE-284 | Access Control (Authorization) Issues |
2% (5) | CWE-639 | Access Control Bypass Through User-Controlled Key |
1% (4) | CWE-770 | Allocation of Resources Without Limits or Throttling |
1% (4) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
1% (4) | CWE-269 | Improper Privilege Management |
1% (3) | CWE-399 | Resource Management Errors |
0% (2) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
0% (2) | CWE-345 | Insufficient Verification of Data Authenticity |
0% (2) | CWE-287 | Improper Authentication |
0% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
0% (1) | CWE-682 | Incorrect Calculation |
0% (1) | CWE-674 | Uncontrolled Recursion |
0% (1) | CWE-640 | Weak Password Recovery Mechanism for Forgotten Password |
0% (1) | CWE-610 | Externally Controlled Reference to a Resource in Another Sphere |
0% (1) | CWE-532 | Information Leak Through Log Files |
0% (1) | CWE-459 | Incomplete Cleanup |
0% (1) | CWE-273 | Improper Check for Dropped Privileges |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-24 | Moodle 3.x PHP code injection attempt RuleID : 51143 - Type : SERVER-WEBAPP - Revision : 1 |
2019-09-24 | Moodle 3.x PHP code injection attempt RuleID : 51142 - Type : SERVER-WEBAPP - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-f4910a3260.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-84a5340cc9.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-6a4a3b78fd.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-690535d30b.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-64955716d6.nasl - Type: ACT_GATHER_INFO |
2018-12-03 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_889e35f4f6a011e882dcfcaa147e860e.nasl - Type: ACT_GATHER_INFO |
2018-11-30 | Name: The remote Fedora host is missing a security update. File: fedora_2018-4ec3eecd7f.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote Fedora host is missing a security update. File: fedora_2018-43ff5f6e5b.nasl - Type: ACT_GATHER_INFO |
2018-09-19 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_074cb225bb2d11e890e1fcaa147e860e.nasl - Type: ACT_GATHER_INFO |
2018-08-09 | Name: The remote Fedora host is missing a security update. File: fedora_2018-ebb1e572c0.nasl - Type: ACT_GATHER_INFO |
2018-04-02 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_cdb4d96234f911e892db080027907385.nasl - Type: ACT_GATHER_INFO |
2018-02-01 | Name: The remote Fedora host is missing a security update. File: fedora_2018-7e086e3309.nasl - Type: ACT_GATHER_INFO |
2018-02-01 | Name: The remote Fedora host is missing a security update. File: fedora_2018-c587c0a62d.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2017-612d3e009f.nasl - Type: ACT_GATHER_INFO |
2017-12-04 | Name: The remote Fedora host is missing a security update. File: fedora_2017-e40e02e0dd.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote Fedora host is missing a security update. File: fedora_2017-475529a26a.nasl - Type: ACT_GATHER_INFO |
2017-07-17 | Name: The remote Fedora host is missing a security update. File: fedora_2017-d5dbc23747.nasl - Type: ACT_GATHER_INFO |
2017-05-30 | Name: The remote Fedora host is missing a security update. File: fedora_2017-4cc8d795e0.nasl - Type: ACT_GATHER_INFO |
2017-05-30 | Name: The remote Fedora host is missing a security update. File: fedora_2017-1f15fde598.nasl - Type: ACT_GATHER_INFO |
2017-04-03 | Name: The remote Fedora host is missing a security update. File: fedora_2017-0fcaf52f1a.nasl - Type: ACT_GATHER_INFO |
2017-04-03 | Name: The remote Fedora host is missing a security update. File: fedora_2017-0196511d58.nasl - Type: ACT_GATHER_INFO |
2017-03-20 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_f72d98d10b7e11e7970f002590263bf5.nasl - Type: ACT_GATHER_INFO |
2017-02-07 | Name: The remote Fedora host is missing a security update. File: fedora_2017-ae7a707032.nasl - Type: ACT_GATHER_INFO |
2017-02-02 | Name: The remote Fedora host is missing a security update. File: fedora_2017-6681f94e10.nasl - Type: ACT_GATHER_INFO |
2016-11-25 | Name: The remote Fedora host is missing a security update. File: fedora_2016-4f7d4df7b3.nasl - Type: ACT_GATHER_INFO |