SB2025021809 - Multiple vulnerabilities in Moodle
Published: February 18, 2025 Updated: May 9, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) SQL injection (CVE-ID: CVE-2025-26533)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in the module list filter within course search. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
2) Information disclosure (CVE-ID: CVE-2025-26525)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to insufficient sanitizing in the TeX notation filter. A remote attacker can gain unauthorized access to sensitive information on sites where pdfTeX is available.
3) Improper access control (CVE-ID: CVE-2025-26526)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to feedback response viewing and deletions do not respect Separate Groups mode. A remote attacker can view or delete the responses in Feedback activities.
4) Information disclosure (CVE-ID: CVE-2025-26527)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to non-searchable tags can still be discovered on the tag search page and in the tags block. A remote user can gain unauthorized access to sensitive information on the system.
5) Improper access control (CVE-ID: CVE-2025-26531)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to the IDOR issue in badges. A remote user can disable badges they do not have permission to access.
6) Improper access control (CVE-ID: CVE-2025-26532)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can evade trusttext config when restoring glossary entries.
7) Stored cross-site scripting (CVE-ID: CVE-2025-26528)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in ddimageortext question type. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
8) Stored cross-site scripting (CVE-ID: CVE-2025-26529)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in admin live log. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
9) Cross-site scripting (CVE-ID: CVE-2025-26530)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within question bank filter. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
10) Prototype pollution (CVE-ID: CVE-2024-38999)
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to prototype pollution via the function s.contexts._.configure. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.
Remediation
Install update from vendor's website.
References
- https://moodle.org/mod/forum/discuss.php?d=466150
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84271
- https://github.com/advisories/GHSA-rg56-94j7-hjx9
- https://moodle.org/mod/forum/discuss.php?d=466141
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84136
- https://github.com/advisories/GHSA-4hmr-39vp-xfrr
- https://moodle.org/mod/forum/discuss.php?d=466142
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79976
- https://github.com/advisories/GHSA-pxg4-xjp7-w9c5
- https://moodle.org/mod/forum/discuss.php?d=466143
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-83941
- https://github.com/advisories/GHSA-5r85-6h7f-rg3r
- https://moodle.org/mod/forum/discuss.php?d=466148
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84239
- https://github.com/advisories/GHSA-g88w-v4cq-qgcp
- https://moodle.org/mod/forum/discuss.php?d=466149
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84003
- https://github.com/advisories/GHSA-cw24-f6fq-7j9v
- https://moodle.org/mod/forum/discuss.php?d=466144
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82896
- https://github.com/advisories/GHSA-h697-w4ph-7pcx
- https://moodle.org/mod/forum/discuss.php?d=466145
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84145
- https://github.com/advisories/GHSA-wr88-x8cm-7cgq
- https://moodle.org/mod/forum/discuss.php?d=466146
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84146
- https://github.com/advisories/GHSA-4w32-c9g7-27qx
- https://moodle.org/mod/forum/discuss.php?d=466147
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-84023