3.1
CVE-2025-3637
- EPSS 0.2%
- Veröffentlicht 25.04.2025 14:42:56
- Zuletzt bearbeitet 29.04.2025 13:52:28
- Quelle patrick@puiterwijk.org
- CVE-Watchlists
- Unerledigt
Moodle: csrf token exposure via url in moodle mod_data module
mod_data edit/delete pages pass CSRF token in GET parameter
A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages.
Mögliche Gegenmaßnahme
Moodle Server: Update to a patched version.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://git.moodle.org
≫
Paket
moodle
Default Statusunaffected
Version
4.5.0
Version <
4.5.4
Status
affected
Version
4.4.0
Version <
4.4.8
Status
affected
Version
4.3.0
Version <
4.3.12
Status
affected
Version
4.1.0
Version <
4.1.18
Status
affected
VulnDex Vulnerability Enrichment
Weitere Schwachstelleninformationen
SystemMoodle
≫
Produkt
Moodle Server
Version
< 4.1.0
Version
>= 4.5.0, < 4.5.4
Version
>= 4.4.0, < 4.4.8
Version
>= 4.3.0, < 4.3.12
Version
>= 4.1.0, < 4.1.18
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.2% | 0.418 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| patrick@puiterwijk.org | 3.1 | 1.6 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
|
CWE-598 Use of GET Request Method With Sensitive Query Strings
The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.