3.1

CVE-2025-3637

Moodle: csrf token exposure via url in moodle mod_data module

mod_data edit/delete pages pass CSRF token in GET parameter

A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages.
Mögliche Gegenmaßnahme
Moodle Server: Update to a patched version.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://git.moodle.org
Paket moodle
Default Statusunaffected
Version 4.5.0
Version < 4.5.4
Status affected
Version 4.4.0
Version < 4.4.8
Status affected
Version 4.3.0
Version < 4.3.12
Status affected
Version 4.1.0
Version < 4.1.18
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Weitere Schwachstelleninformationen
SystemMoodle
Produkt Moodle Server
Version < 4.1.0
Version >= 4.5.0, < 4.5.4
Version >= 4.4.0, < 4.4.8
Version >= 4.3.0, < 4.3.12
Version >= 4.1.0, < 4.1.18
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.2% 0.418
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
patrick@puiterwijk.org 3.1 1.6 1.4
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
CWE-598 Use of GET Request Method With Sensitive Query Strings

The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.