Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3637: Use of GET Request Method With Sensitive Query Strings

0
Low
VulnerabilityCVE-2025-3637cvecve-2025-3637
Published: Fri Apr 25 2025 (04/25/2025, 14:42:56 UTC)
Source: CVE

Description

A security vulnerability was found in Moodle where confidential information that prevents cross-site request forgery (CSRF) attacks was shared publicly through the site's URL. This vulnerability occurred specifically on two types of pages within the mod_data module: edit and delete pages.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:41:37 UTC

Technical Analysis

CVE-2025-3637 identifies a security vulnerability in the Moodle learning management system, specifically within the mod_data module's edit and delete pages. The vulnerability stems from the use of HTTP GET requests that include sensitive anti-CSRF tokens in the URL query string. These tokens are intended to prevent cross-site request forgery attacks by validating that requests originate from legitimate users. However, embedding these tokens in URLs exposes them to potential leakage through browser history, server logs, referer headers, or network monitoring. The affected Moodle versions are 4.1.0, 4.3.0, 4.4.0, and 4.5.0. The vulnerability does not allow direct unauthorized actions or code execution but compromises the confidentiality of CSRF tokens, which could facilitate CSRF attacks if combined with other weaknesses. The CVSS v3.1 score is 3.1, reflecting low severity due to the limited impact and the requirement for low privileges but no user interaction. No public exploits are known, and no patches are currently linked, indicating this is a recently disclosed issue. The vulnerability highlights improper handling of sensitive data in URLs, a common web security anti-pattern.

Potential Impact

The primary impact of CVE-2025-3637 is the unintended disclosure of anti-CSRF tokens, which reduces the effectiveness of CSRF protections in Moodle's mod_data module. While this does not directly allow attackers to perform unauthorized actions, it increases the risk that an attacker who can observe URLs or logs might reuse these tokens to craft malicious requests that bypass CSRF defenses. This could lead to unauthorized data modifications or deletions within the affected module if combined with other vulnerabilities or social engineering. The confidentiality of tokens is compromised, but integrity and availability remain unaffected. For organizations relying on Moodle for education, training, or collaboration, this vulnerability could undermine trust and data security, especially in environments where multiple users share systems or logs are accessible. The low CVSS score reflects the limited scope and impact, but the vulnerability should not be ignored as it weakens a critical security control.

Mitigation Recommendations

To mitigate CVE-2025-3637, organizations should prioritize updating Moodle to versions where this vulnerability is patched once official updates are released. In the interim, administrators can implement the following specific measures: 1) Configure Moodle or the web server to avoid using GET requests for operations involving sensitive tokens, switching to POST requests where tokens are included in the request body rather than the URL. 2) Employ URL rewriting or filtering rules to prevent sensitive query strings from being logged or exposed in referer headers. 3) Educate users and administrators to clear browser histories and caches regularly to reduce token exposure. 4) Review and restrict access to server logs and monitoring systems to minimize unauthorized viewing of URLs containing sensitive data. 5) Implement Content Security Policy (CSP) and Referrer-Policy headers to limit referer leakage. 6) Monitor Moodle activity logs for unusual or unauthorized edit/delete operations that could indicate exploitation attempts. These targeted mitigations go beyond generic advice by focusing on eliminating token exposure in URLs and protecting logs and referer data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2025-04-15T11:19:07.842Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf0240

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 2/27/2026, 1:41:37 PM

Last updated: 3/26/2026, 8:04:57 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses