8.1
CVE-2025-67848
- EPSS 0.06%
- Veröffentlicht 03.02.2026 11:15:54
- Zuletzt bearbeitet 11.02.2026 18:31:20
- Quelle patrick@puiterwijk.org
- CVE-Watchlists
- Unerledigt
Moodle: moodle: authentication bypass via lti provider allows suspended users to gain unauthorized access.
Authentication via LTI Provider available to suspended users
A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the user's suspension status, enabling unauthorized access to the system. This can lead to information disclosure or other unauthorized actions by users who should be restricted.
Mögliche Gegenmaßnahme
Moodle Server: Update to a patched version.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VulnDex Vulnerability Enrichment
Weitere Schwachstelleninformationen
SystemMoodle
≫
Produkt
Moodle Server
Version
< 4.1.0
Version
>= 5.1.0, < 5.1.1
Version
>= 5.0.0, < 5.0.4
Version
>= 4.5.0, < 4.5.8
Version
>= 4.4.0, < 4.4.12
Version
>= 4.1.0, < 4.1.22
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.183 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| patrick@puiterwijk.org | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
|
CWE-280 Improper Handling of Insufficient Permissions or Privileges
The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state.