CVE-2025-62400
BaseFortify
Publication date: 2025-10-23
Last updated on: 2025-11-14
Assigner: Fedora Project
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| moodle | moodle | From 4.1.0 (inc) to 4.1.21 (exc) |
| moodle | moodle | From 4.4.0 (inc) to 4.4.11 (exc) |
| moodle | moodle | From 4.5.0 (inc) to 4.5.7 (exc) |
| moodle | moodle | From 5.0.0 (inc) to 5.0.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Moodle allows users who have permission to create calendar eventsβbut not permission to view hidden groupsβto see the names of those hidden groups. This happens because of a missing capability check in the calendar event creation workflow, which unintentionally exposes private or restricted group names to unauthorized users. [1]
How can this vulnerability impact me? :
The vulnerability can impact you by exposing the names of hidden or private groups within a Moodle course to users who should not have access to that information. This could lead to unintended disclosure of confidential group information, potentially compromising privacy and trust within the organization or educational institution using Moodle. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by verifying the Moodle version in use to see if it falls within the affected ranges (5.0 to 5.0.2, 4.5 to 4.5.6, 4.4 to 4.4.10, 4.1 to 4.1.20). Additionally, checking user permissions related to calendar event creation and attempting to access hidden group names through the calendar event creation interface can help detect the issue. Specific commands to check Moodle version on the server include: `grep '$release' version.php` in the Moodle installation directory or checking the version via the Moodle admin interface. There are no direct network commands provided to detect this vulnerability. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading Moodle to a fixed version: 5.0.3, 4.5.7, 4.4.11, or 4.1.21 or later. Until an upgrade can be performed, review and restrict permissions for users who can create calendar events to prevent unauthorized access to hidden group names. [1]