Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60511: n/a

0
Medium
VulnerabilityCVE-2025-60511cvecve-2025-60511
Published: Tue Oct 21 2025 (10/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Moodle OpenAI Chat Block plugin 3.0.1 (2025021700) suffers from an Insecure Direct Object Reference (IDOR) vulnerability due to insufficient validation of the blockId parameter in /blocks/openai_chat/api/completion.php. An authenticated student can impersonate another user's block (e.g., administrator) and send queries that are executed with that block's configuration. This can expose administrator-only Source of Truth entries, alter model behavior, and potentially misuse API resources.

AI-Powered Analysis

AILast updated: 10/21/2025, 17:25:18 UTC

Technical Analysis

The vulnerability identified as CVE-2025-60511 affects the Moodle OpenAI Chat Block plugin version 3.0.1 (build 2025021700). It is an Insecure Direct Object Reference (IDOR) flaw arising from insufficient validation of the blockId parameter in the API endpoint /blocks/openai_chat/api/completion.php. This parameter is intended to identify the specific chat block instance a user is interacting with. However, due to inadequate access control checks, an authenticated student can supply a blockId belonging to another user, including privileged users such as administrators. By doing so, the attacker can impersonate that user’s chat block context, gaining unauthorized access to administrator-only Source of Truth entries—data that likely influences AI responses or contains sensitive configuration. Additionally, the attacker can alter the behavior of the AI model by sending queries under the administrator’s configuration, potentially manipulating AI outputs or exhausting API usage quotas tied to privileged accounts. The vulnerability requires the attacker to be authenticated as a student but does not require further user interaction or social engineering. No public exploits have been reported yet, but the flaw presents a significant risk to the confidentiality and integrity of Moodle deployments using this plugin. The lack of a CVSS score indicates this is a newly published vulnerability with limited public analysis. The vulnerability’s impact is compounded by the strategic role of Moodle in educational institutions and the sensitive nature of administrator-level data and AI model configurations.

Potential Impact

For European organizations, particularly educational institutions and universities that rely heavily on Moodle as a learning management system, this vulnerability poses a significant risk. Unauthorized access to administrator-only data can lead to exposure of sensitive educational content, internal configurations, or AI training data, undermining confidentiality. Manipulation of AI model behavior could degrade the quality of AI-assisted learning tools or introduce misinformation, impacting the integrity of educational services. Misuse of API resources under privileged accounts could lead to denial of service or increased operational costs. The breach of trust and potential data leakage could also have regulatory implications under GDPR, especially if personal data is involved. The impact is heightened in countries with widespread Moodle adoption and where AI integration in education is more advanced. Since exploitation requires authentication, the threat is primarily from insider attackers or compromised student accounts, but the consequences remain severe.

Mitigation Recommendations

To mitigate this vulnerability, Moodle administrators should immediately audit and update the OpenAI Chat Block plugin to a patched version once available. In the absence of a patch, implement strict server-side validation of the blockId parameter to ensure it matches the authenticated user’s permissions before processing any requests. Enforce role-based access controls rigorously to prevent students from accessing administrator-level blocks. Monitor API usage logs for unusual patterns indicative of impersonation or resource abuse. Consider temporarily disabling the OpenAI Chat Block plugin if the risk is unacceptable and no patch is available. Educate users about the importance of account security to prevent credential compromise. Additionally, implement network-level controls to restrict API access and apply rate limiting to reduce the impact of potential misuse. Regularly review and update security policies around third-party plugins and AI integrations within Moodle environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f7be6441ea2e78b8952f35

Added to database: 10/21/2025, 5:09:56 PM

Last enriched: 10/21/2025, 5:25:18 PM

Last updated: 10/21/2025, 8:00:35 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats