7.5
CVE-2025-32044
- EPSS 0.17%
- Veröffentlicht 25.04.2025 14:43:22
- Zuletzt bearbeitet 29.04.2025 13:52:28
- Quelle patrick@puiterwijk.org
- CVE-Watchlists
- Unerledigt
Moodle: unauthenticated rest api user data exposure
Unauthenticated REST API user data exposure
A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data—including names, contact information, and hashed passwords—via stack traces returned by specific API calls. Sites with PHP configured with zend.exception_ignore_args = 1 in the php.ini file are not affected by this vulnerability.
Mögliche Gegenmaßnahme
Moodle Server: Update to a patched version.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttp://git.moodle.org/gw?p=moodle.git
≫
Paket
moodle
Default Statusunaffected
Version <=
4.5.2
Version
4.5.0
Status
affected
VulnDex Vulnerability Enrichment
Weitere Schwachstelleninformationen
SystemMoodle
≫
Produkt
Moodle Server
Version
>= 4.5.0, < 4.5.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.17% | 0.371 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| patrick@puiterwijk.org | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.