Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62394: Incorrect Authorization

0
Medium
VulnerabilityCVE-2025-62394cvecve-2025-62394
Published: Thu Oct 23 2025 (10/23/2025, 11:28:27 UTC)
Source: CVE Database V5

Description

Moodle failed to verify enrolment status correctly when sending quiz notifications. As a result, suspended or inactive users might receive quiz-related messages, leaking limited course information.

AI-Powered Analysis

AILast updated: 10/23/2025, 11:55:02 UTC

Technical Analysis

CVE-2025-62394 is an authorization vulnerability identified in Moodle versions 4.5.0 and 5.0.0, published on October 23, 2025. The flaw arises because Moodle fails to correctly verify the enrolment status of users when sending quiz notifications. Specifically, suspended or inactive users, who should not receive such communications, may still be sent quiz-related messages. This results in an unintended information disclosure, leaking limited course details to unauthorized users. The vulnerability has a CVSS v3.1 base score of 4.3, indicating medium severity, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. This means the vulnerability can be exploited remotely over the network with low attack complexity and requires privileges equivalent to a logged-in user but no user interaction. The impact is limited to confidentiality, as no integrity or availability issues are involved. There are no known exploits in the wild, and no official patches have been linked at the time of publication. The vulnerability is significant for organizations relying on Moodle for e-learning, as it may expose course-related information to users who should not have access, potentially violating privacy policies and data protection regulations.

Potential Impact

For European organizations, particularly educational institutions and e-learning providers using Moodle versions 4.5.0 or 5.0.0, this vulnerability poses a risk of unauthorized information disclosure. Although the leaked information is limited to quiz notifications and does not compromise system integrity or availability, it could still reveal sensitive course content or assessment details to suspended or inactive users. This may undermine the confidentiality of educational materials and violate GDPR requirements regarding data protection and user privacy. The impact is more pronounced in large-scale deployments where many users are enrolled, increasing the likelihood of suspended or inactive accounts receiving unintended notifications. Additionally, reputational damage and loss of trust could occur if students or staff perceive the platform as insecure. However, since exploitation requires at least some level of user privilege and no user interaction, the risk is somewhat mitigated compared to more severe vulnerabilities.

Mitigation Recommendations

Organizations should monitor Moodle security advisories closely and apply official patches as soon as they become available to address CVE-2025-62394. Until patches are released, administrators can implement temporary controls such as reviewing and restricting notification settings to ensure quiz notifications are not sent to suspended or inactive users. Conducting an audit of user enrolment statuses and cleaning up inactive or suspended accounts can reduce the attack surface. Additionally, enabling logging and monitoring of notification delivery can help detect any unauthorized message dissemination. Educating staff and users about the issue and encouraging prompt reporting of suspicious notifications can further mitigate risk. Finally, organizations should consider upgrading to Moodle versions beyond 5.0.0 once patched versions are released, as these will likely include the fix and other security improvements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2025-10-13T10:12:30.925Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa15ae457d6b06b51715d2

Added to database: 10/23/2025, 11:46:54 AM

Last enriched: 10/23/2025, 11:55:02 AM

Last updated: 10/30/2025, 1:36:00 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats