CVE-2025-62395
BaseFortify
Publication date: 2025-10-23
Last updated on: 2025-11-14
Assigner: Fedora Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| moodle | moodle | From 4.1.0 (inc) to 4.1.21 (exc) |
| moodle | moodle | From 4.4.0 (inc) to 4.4.11 (exc) |
| moodle | moodle | From 4.5.0 (inc) to 4.5.7 (exc) |
| moodle | moodle | From 5.0.0 (inc) to 5.0.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Moodle's external cohort search service allows users who have permissions in lower contexts to bypass proper checks and access cohort information from the higher-level system context. This means that a user with permission to manage cohorts locally can enumerate or access restricted administrative data from system cohorts, which should normally be inaccessible to them. [1]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of sensitive administrative information by allowing users with limited permissions to access higher-level cohort data. This exposure could result in information leakage, potentially compromising the confidentiality of administrative data within the Moodle system. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately upgrade Moodle to a fixed version: 5.0.3, 4.5.7, 4.4.11, or 4.1.21 or later. These versions contain the fix for the cohort search service flaw that improperly enforces context-based capability checks. [1]