Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3625: Authorization Bypass Through User-Controlled Key

0
High
VulnerabilityCVE-2025-3625cvecve-2025-3625
Published: Fri Apr 25 2025 (04/25/2025, 14:42:39 UTC)
Source: CVE

Description

A security vulnerability was discovered in Moodle that can allow hackers to gain access to sensitive information about students and prevent them from logging into their accounts, even after they had completed two-factor authentication (2FA).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:39:55 UTC

Technical Analysis

CVE-2025-3625 is an authorization bypass vulnerability identified in Moodle versions 4.3.0, 4.4.0, and 4.5.0. The flaw arises from the improper validation of a user-controlled key within Moodle's authentication or authorization mechanisms. This weakness allows an attacker with some level of privileges (likely a low-privileged user) to bypass authorization controls, gaining unauthorized access to sensitive student data. Additionally, the attacker can disrupt legitimate users' ability to log in, effectively causing a denial of service even after those users have successfully completed two-factor authentication. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) indicates network attack vector, low attack complexity, requires privileges, no user interaction, unchanged scope, low confidentiality impact, no integrity impact, and high availability impact. Although no public exploits have been reported yet, the vulnerability's nature suggests it could be leveraged to compromise student privacy and disrupt educational services. The lack of patch links suggests that fixes may be forthcoming or pending release. The vulnerability has been enriched by CISA, indicating recognition by US cybersecurity authorities.

Potential Impact

The vulnerability poses a significant threat to educational institutions and organizations using Moodle as their learning management system. Unauthorized access to sensitive student information can lead to privacy violations, data breaches, and potential regulatory non-compliance. The ability to prevent users from logging in, even after 2FA, can disrupt educational activities, causing denial of service to students and educators. This can impact the integrity of academic processes and trust in the platform. Since Moodle is widely used globally, especially in higher education and government training programs, the disruption and data exposure risks are substantial. Attackers exploiting this vulnerability could also leverage the access to further pivot within affected networks. The requirement for some privileges to exploit limits the attack surface but does not eliminate risk, especially in environments with many users. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation.

Mitigation Recommendations

Organizations should immediately inventory their Moodle installations to identify affected versions (4.3.0, 4.4.0, 4.5.0). Until patches are released, restrict access to Moodle instances to trusted networks and users, minimizing exposure. Implement strict role-based access controls to limit privileges that could be exploited. Monitor authentication logs for unusual login failures or access patterns indicative of exploitation attempts. Consider temporarily disabling or restricting features that rely on the vulnerable authorization mechanism if feasible. Once patches or updates become available from Moodle, apply them promptly. Conduct security awareness training for administrators to recognize and respond to potential exploitation signs. Employ network-level protections such as web application firewalls with custom rules to detect anomalous requests targeting authorization functions. Regularly back up Moodle data and configurations to enable rapid recovery in case of denial-of-service or data tampering. Engage with Moodle security advisories and subscribe to vulnerability notifications to stay informed about updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2025-04-15T06:45:25.748Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf01c2

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 2/27/2026, 1:39:55 PM

Last updated: 3/24/2026, 7:04:15 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses