Moodle 4.5.x < 4.5.4 Multiple Vulnerabilities

medium Web App Scanning Plugin ID 114897

Synopsis

Moodle 4.5.x < 4.5.4 Multiple Vulnerabilities

Description

According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.18 or 4.3.x prior to 4.3.12 or 4.4.x prior to 4.4.8 or 4.5.x prior to 4.5.4. It is, therefore, affected by multiple vulnerabilities :

- Additional checks were required to ensure users can only fetch cohort data they are intended to have access to.

- Insufficient capability checks in a messaging web service made it possible to view other users' names and online status.

- Additional checks were required to prevent users deleting course sections they did not have permission to modify.

- The return URL in the policy tool required extra sanitizing to prevent a reflected XSS risk.

- A remote code execution risk was identified in the Moodle LMS EQUELLA repository. By default this was only available to teachers and managers, on sites with the EQUELLA repository enabled.

- A remote code execution risk was identified in the Moodle LMS Dropbox repository. By default this was only available to teachers and managers, on sites with the Dropbox repository enabled.

- Insufficient capability checks made it possible for a user enrolled in a course to access some details (full name and profile image URL) of other users they did not have permission to access.

- The analysis request action in the Brickfield tool did not include the necessary token to prevent a CSRF risk.

- A user's CSRF token was unnecessarily included in the URL on the database module's edit and delete pages.

- Insufficient capability checks made it possible to view RSS feed content a user does not have permission to access.

- The user tours duplicate tour action did not include the necessary token to prevent a CSRF risk.

- On sites with Multi-Factor Authentication enabled, it was possible to use course self enrolment after passing only the first login factor (such as passing a username/password check). The user should also have to pass a second login factor before gaining access to self enrolment.

- Additional capability checks were required to prevent teachers from being able to identify a user's anonymous assignment submissions via the submissions search.

- On sites with Multi-Factor Authentication enabled, it was possible for a user to access some of their data after passing only the first login factor (such as passing a username/password check). The user should have to also pass a second factor check before gaining access to that data.

- A missing check in the Multi-Factor Authentication email factor's revoke/cancel action could lead to a Denial of Service risk for users logging in who have email as their only available second factor. If exploited, the impacted user's name was disclosed.

- Insufficient sanitizing in an undocumented MimeTeX command resulted in a remote code execution risk for sites using MimeTeX (via the TeX Notation filter).

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update to Moodle version 4.5.4 or later.

See Also

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-65356

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72704

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-83994

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84351

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84447

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84473

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84475

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84478

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84479

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84499

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84750

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84784

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84865

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-85015

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-85104

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-85152

https://moodle.org/mod/forum/discuss.php?d=467592#p1877211

https://moodle.org/mod/forum/discuss.php?d=467593#p1877212

https://moodle.org/mod/forum/discuss.php?d=467594#p1877213

https://moodle.org/mod/forum/discuss.php?d=467595#p1877214

https://moodle.org/mod/forum/discuss.php?d=467596#p1877215

https://moodle.org/mod/forum/discuss.php?d=467597#p1877217

https://moodle.org/mod/forum/discuss.php?d=467598#p1877218

https://moodle.org/mod/forum/discuss.php?d=467599#p1877219

https://moodle.org/mod/forum/discuss.php?d=467600#p1877220

https://moodle.org/mod/forum/discuss.php?d=467601#p1877221

https://moodle.org/mod/forum/discuss.php?d=467602#p1877222

https://moodle.org/mod/forum/discuss.php?d=467603#p1877223

https://moodle.org/mod/forum/discuss.php?d=467604#p1877224

https://moodle.org/mod/forum/discuss.php?d=467605#p1877225

https://moodle.org/mod/forum/discuss.php?d=467606#p1877226

https://moodle.org/mod/forum/discuss.php?d=467607#p1877227

Plugin Details

Severity: Medium

ID: 114897

Type: remote

Published: 6/24/2025

Updated: 6/24/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-40446

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2024-40446

CVSS v4

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2025-3638

Vulnerability Information

CPE: cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 4/20/2025

Reference Information

CVE: CVE-2024-40446, CVE-2025-3625, CVE-2025-3627, CVE-2025-3628, CVE-2025-3634, CVE-2025-3635, CVE-2025-3636, CVE-2025-3637, CVE-2025-3638, CVE-2025-3640, CVE-2025-3641, CVE-2025-3642, CVE-2025-3643, CVE-2025-3644, CVE-2025-3645, CVE-2025-3647

CWE: 200, 287, 352, 598, 639, 79, 863, 94

OWASP: 2010-A1, 2010-A2, 2010-A3, 2010-A5, 2010-A6, 2010-A8, 2010-A9, 2013-A1, 2013-A2, 2013-A3, 2013-A5, 2013-A6, 2013-A7, 2013-A8, 2013-A9, 2017-A1, 2017-A2, 2017-A3, 2017-A5, 2017-A6, 2017-A7, 2017-A9, 2021-A1, 2021-A3, 2021-A4, 2021-A6, 2021-A7

WASC: Cross-Site Request Forgery, Cross-Site Scripting, Information Leakage, Insufficient Authentication, Insufficient Authorization, Insufficient Transport Layer Protection, OS Commanding

CAPEC: 111, 114, 115, 116, 13, 151, 169, 194, 209, 22, 224, 242, 285, 287, 290, 291, 292, 293, 294, 295, 296, 297, 298, 299, 300, 301, 302, 303, 304, 305, 306, 307, 308, 309, 310, 312, 313, 317, 318, 319, 320, 321, 322, 323, 324, 325, 326, 327, 328, 329, 330, 35, 462, 467, 472, 497, 508, 57, 573, 574, 575, 576, 577, 588, 59, 591, 592, 593, 60, 616, 62, 63, 633, 643, 646, 650, 651, 77, 79, 85, 94

DISA STIG: APSC-DV-000460, APSC-DV-002480, APSC-DV-002490, APSC-DV-002500, APSC-DV-002510, APSC-DV-002630

HIPAA: 164.306(a)(1), 164.306(a)(2), 164.312(a)(1), 164.312(a)(2)(i)

ISO: 27001-A.12.6.1, 27001-A.13.1.1, 27001-A.14.1.2, 27001-A.14.1.3, 27001-A.14.2.5, 27001-A.18.1.3, 27001-A.6.2.2, 27001-A.9.1.2, 27001-A.9.4.1, 27001-A.9.4.4, 27001-A.9.4.5

NIST: sp800_53-AC-3, sp800_53-CM-6b, sp800_53-SI-10, sp800_53-SI-10(5), sp800_53-SI-15

OWASP API: 2019-API3, 2019-API7, 2019-API8, 2023-API3, 2023-API8

OWASP ASVS: 4.0.2-14.2.1, 4.0.2-3.1.1, 4.0.2-4.2.2, 4.0.2-5.2.5, 4.0.2-5.3.3, 4.0.2-8.3.4

PCI-DSS: 3.2-6.2, 3.2-6.5.1, 3.2-6.5.10, 3.2-6.5.4, 3.2-6.5.7, 3.2-6.5.8, 3.2-6.5.9