Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67852: URL Redirection to Untrusted Site ('Open Redirect')

0
Low
VulnerabilityCVE-2025-67852cvecve-2025-67852
Published: Tue Feb 03 2026 (02/03/2026, 10:52:09 UTC)
Source: CVE Database V5

Description

A flaw was found in Moodle. An open redirect vulnerability in the OAuth login flow allows a remote attacker to redirect users to attacker-controlled pages after they have successfully authenticated. This occurs due to insufficient validation of redirect parameters, which could lead to phishing attacks or information disclosure.

AI-Powered Analysis

AILast updated: 02/27/2026, 15:52:35 UTC

Technical Analysis

CVE-2025-67852 is an open redirect vulnerability identified in the OAuth login flow of Moodle, a widely used open-source learning management system. The vulnerability arises from insufficient validation of redirect parameters after successful user authentication. Specifically, when a user logs in via OAuth, the application fails to properly verify the destination URL, allowing an attacker to craft a malicious URL that redirects the user to an attacker-controlled site. This can be exploited remotely by sending specially crafted links to users, who upon clicking and authenticating, are redirected to phishing or malicious websites. The vulnerability affects multiple Moodle versions including 4.1.0, 4.4.0, 4.5.0, 5.0.0, and 5.1.0. The CVSS 3.1 base score is 3.5, reflecting low severity due to the requirement of user interaction and privileges, and limited impact on confidentiality only. No integrity or availability impacts are noted. No public exploits have been reported to date. The flaw primarily enables social engineering attacks such as phishing, potentially leading to credential theft or information disclosure if users are deceived. The vulnerability is categorized as an open redirect, a common web security issue that can undermine user trust and facilitate further attacks.

Potential Impact

The primary impact of CVE-2025-67852 is the facilitation of phishing attacks by redirecting authenticated Moodle users to malicious external sites. This can lead to credential theft, session hijacking, or exposure to malware if users are tricked into interacting with attacker-controlled pages. Although the vulnerability does not directly compromise system integrity or availability, the indirect consequences can be significant, especially in educational environments where sensitive student and faculty data is involved. Organizations relying on affected Moodle versions risk reputational damage and potential data breaches if users fall victim to phishing campaigns leveraging this flaw. The requirement for user interaction and some privilege limits the ease of exploitation but does not eliminate risk, particularly in large user bases where targeted phishing can be effective. The lack of known exploits reduces immediate threat but vigilance is necessary. Overall, the vulnerability poses a moderate threat to confidentiality and user trust within affected organizations worldwide.

Mitigation Recommendations

To mitigate CVE-2025-67852, organizations should immediately upgrade Moodle installations to patched versions once available. In the interim, administrators can implement strict validation of redirect URLs in the OAuth login flow, ensuring only whitelisted or internal URLs are accepted. Employing Content Security Policy (CSP) headers can help restrict navigation to trusted domains. User education on phishing risks and cautious handling of login links is critical. Monitoring logs for unusual redirect patterns or login anomalies can aid early detection of exploitation attempts. Additionally, implementing multi-factor authentication (MFA) reduces the risk of credential compromise even if phishing occurs. Security teams should review OAuth configurations and consider disabling or restricting OAuth login flows if not essential. Regular vulnerability scanning and penetration testing focused on authentication flows can help identify similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-12-12T13:00:24.330Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69821b8cf9fa50a62fcf9c3a

Added to database: 2/3/2026, 4:00:12 PM

Last enriched: 2/27/2026, 3:52:35 PM

Last updated: 3/20/2026, 6:15:01 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses