CVE-2025-67852: URL Redirection to Untrusted Site ('Open Redirect')
A flaw was found in Moodle. An open redirect vulnerability in the OAuth login flow allows a remote attacker to redirect users to attacker-controlled pages after they have successfully authenticated. This occurs due to insufficient validation of redirect parameters, which could lead to phishing attacks or information disclosure.
AI Analysis
Technical Summary
CVE-2025-67852 is an open redirect vulnerability identified in the OAuth login flow of Moodle, a widely used open-source learning management system. The vulnerability arises from insufficient validation of redirect parameters after successful user authentication. Specifically, when a user logs in via OAuth, the application fails to properly verify the destination URL, allowing an attacker to craft a malicious URL that redirects the user to an attacker-controlled site. This can be exploited remotely by sending specially crafted links to users, who upon clicking and authenticating, are redirected to phishing or malicious websites. The vulnerability affects multiple Moodle versions including 4.1.0, 4.4.0, 4.5.0, 5.0.0, and 5.1.0. The CVSS 3.1 base score is 3.5, reflecting low severity due to the requirement of user interaction and privileges, and limited impact on confidentiality only. No integrity or availability impacts are noted. No public exploits have been reported to date. The flaw primarily enables social engineering attacks such as phishing, potentially leading to credential theft or information disclosure if users are deceived. The vulnerability is categorized as an open redirect, a common web security issue that can undermine user trust and facilitate further attacks.
Potential Impact
The primary impact of CVE-2025-67852 is the facilitation of phishing attacks by redirecting authenticated Moodle users to malicious external sites. This can lead to credential theft, session hijacking, or exposure to malware if users are tricked into interacting with attacker-controlled pages. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences can be significant, especially in educational environments where sensitive student and faculty data is involved. Organizations relying on affected Moodle versions risk reputational damage and potential data breaches if users fall victim to phishing campaigns leveraging this flaw. The requirement for user interaction and some privilege limits the ease of exploitation but does not eliminate risk, particularly in large user bases where targeted phishing can be effective. The lack of known exploits reduces immediate threat but vigilance is necessary. Overall, the vulnerability poses a moderate threat to confidentiality and user trust within affected organizations worldwide.
Mitigation Recommendations
To mitigate CVE-2025-67852, organizations should immediately upgrade Moodle installations to patched versions once available. In the interim, administrators can implement strict validation of redirect URLs in the OAuth login flow, ensuring only whitelisted or internal URLs are accepted. Employing Content Security Policy (CSP) headers can help restrict navigation to trusted domains. User education on phishing risks and cautious handling of login links is critical. Monitoring logs for unusual redirect patterns or login anomalies can aid early detection of exploitation attempts. Additionally, implementing multi-factor authentication (MFA) reduces the risk of credential compromise even if phishing occurs. Security teams should review OAuth configurations and consider disabling or restricting OAuth login flows if not essential. Regular vulnerability scanning and penetration testing focused on authentication flows can help identify similar issues proactively.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, South Africa, Netherlands, New Zealand
CVE-2025-67852: URL Redirection to Untrusted Site ('Open Redirect')
Description
A flaw was found in Moodle. An open redirect vulnerability in the OAuth login flow allows a remote attacker to redirect users to attacker-controlled pages after they have successfully authenticated. This occurs due to insufficient validation of redirect parameters, which could lead to phishing attacks or information disclosure.
AI-Powered Analysis
Technical Analysis
CVE-2025-67852 is an open redirect vulnerability identified in the OAuth login flow of Moodle, a widely used open-source learning management system. The vulnerability arises from insufficient validation of redirect parameters after successful user authentication. Specifically, when a user logs in via OAuth, the application fails to properly verify the destination URL, allowing an attacker to craft a malicious URL that redirects the user to an attacker-controlled site. This can be exploited remotely by sending specially crafted links to users, who upon clicking and authenticating, are redirected to phishing or malicious websites. The vulnerability affects multiple Moodle versions including 4.1.0, 4.4.0, 4.5.0, 5.0.0, and 5.1.0. The CVSS 3.1 base score is 3.5, reflecting low severity due to the requirement of user interaction and privileges, and limited impact on confidentiality only. No integrity or availability impacts are noted. No public exploits have been reported to date. The flaw primarily enables social engineering attacks such as phishing, potentially leading to credential theft or information disclosure if users are deceived. The vulnerability is categorized as an open redirect, a common web security issue that can undermine user trust and facilitate further attacks.
Potential Impact
The primary impact of CVE-2025-67852 is the facilitation of phishing attacks by redirecting authenticated Moodle users to malicious external sites. This can lead to credential theft, session hijacking, or exposure to malware if users are tricked into interacting with attacker-controlled pages. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences can be significant, especially in educational environments where sensitive student and faculty data is involved. Organizations relying on affected Moodle versions risk reputational damage and potential data breaches if users fall victim to phishing campaigns leveraging this flaw. The requirement for user interaction and some privilege limits the ease of exploitation but does not eliminate risk, particularly in large user bases where targeted phishing can be effective. The lack of known exploits reduces immediate threat but vigilance is necessary. Overall, the vulnerability poses a moderate threat to confidentiality and user trust within affected organizations worldwide.
Mitigation Recommendations
To mitigate CVE-2025-67852, organizations should immediately upgrade Moodle installations to patched versions once available. In the interim, administrators can implement strict validation of redirect URLs in the OAuth login flow, ensuring only whitelisted or internal URLs are accepted. Employing Content Security Policy (CSP) headers can help restrict navigation to trusted domains. User education on phishing risks and cautious handling of login links is critical. Monitoring logs for unusual redirect patterns or login anomalies can aid early detection of exploitation attempts. Additionally, implementing multi-factor authentication (MFA) reduces the risk of credential compromise even if phishing occurs. Security teams should review OAuth configurations and consider disabling or restricting OAuth login flows if not essential. Regular vulnerability scanning and penetration testing focused on authentication flows can help identify similar issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fedora
- Date Reserved
- 2025-12-12T13:00:24.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69821b8cf9fa50a62fcf9c3a
Added to database: 2/3/2026, 4:00:12 PM
Last enriched: 2/27/2026, 3:52:35 PM
Last updated: 3/20/2026, 6:15:01 PM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.