Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3645: Incorrect Authorization

0
Medium
VulnerabilityCVE-2025-3645cvecve-2025-3645
Published: Fri Apr 25 2025 (04/25/2025, 14:43:15 UTC)
Source: CVE

Description

A flaw was found in Moodle. Insufficient capability checks in a messaging web service allowed users to view other users' names and online statuses.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:43:48 UTC

Technical Analysis

CVE-2025-3645 is an authorization vulnerability discovered in Moodle, a widely used open-source learning management system. The flaw arises from insufficient capability checks within a messaging web service component, which fails to properly restrict access to user information. Specifically, authenticated users with low-level privileges can query the service to retrieve other users' names and their online statuses, information that should normally be protected. The vulnerability affects Moodle versions 4.1.0, 4.3.0, 4.4.0, and 4.5.0. The CVSS 3.1 base score is 4.3, reflecting a medium severity level. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction (UI:N) needed. The scope remains unchanged (S:U), and the impact is limited to confidentiality (C:L) with no integrity (I:N) or availability (A:N) impact. There are no known exploits in the wild at this time. The vulnerability could be leveraged by malicious insiders or compromised accounts to gather user presence data, potentially aiding in social engineering or further targeted attacks. The lack of proper authorization checks indicates a design or implementation oversight in the messaging service's access control mechanisms. No official patches or mitigation links were provided in the source information, suggesting that organizations should monitor Moodle advisories for updates or consider temporary access restrictions to the messaging service.

Potential Impact

The primary impact of CVE-2025-3645 is unauthorized disclosure of user identity and presence information within Moodle environments. While this does not directly compromise data integrity or system availability, it undermines user privacy and can facilitate reconnaissance activities by attackers. Exposure of online status and user names can enable social engineering, phishing, or targeted attacks against educators, students, and administrators. In large educational institutions or organizations relying heavily on Moodle for communication, this could lead to increased risk of account compromise or insider threats. The vulnerability's requirement for authenticated access limits exploitation to users with some level of system access, but given the low privilege needed, even standard users could abuse it. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern for privacy and information security compliance, especially in regions with strict data protection regulations.

Mitigation Recommendations

Organizations should apply official Moodle patches as soon as they become available to address CVE-2025-3645. In the interim, administrators can restrict access to the vulnerable messaging web service by implementing network-level controls such as firewall rules or web application firewall (WAF) policies that limit access to trusted users only. Reviewing and tightening user role permissions to ensure that only necessary users have messaging service access can reduce exposure. Monitoring logs for unusual access patterns to the messaging service may help detect exploitation attempts. Additionally, organizations should educate users about the risks of social engineering and encourage strong authentication practices. If possible, upgrading to Moodle versions beyond 4.5.0 where the vulnerability is fixed is recommended. Regular security assessments and penetration testing focused on authorization controls in web services can help identify similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2025-04-15T13:05:26.013Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef6a2

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 2/27/2026, 1:43:48 PM

Last updated: 3/25/2026, 5:34:55 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses