CVE-2025-67852: URL Redirection to Untrusted Site ('Open Redirect')
CVE-2025-67852 is an open redirect vulnerability in Moodle's OAuth login flow affecting versions 4. 1. 0 through 5. 1. 0. The flaw allows remote attackers to redirect authenticated users to attacker-controlled websites due to insufficient validation of redirect parameters. This can facilitate phishing attacks by tricking users into believing they are interacting with legitimate Moodle services. The vulnerability has a low CVSS score of 3. 5, indicating limited direct impact but potential for social engineering exploitation. No known exploits are currently in the wild.
AI Analysis
Technical Summary
CVE-2025-67852 is an open redirect vulnerability identified in Moodle versions 4.1.0, 4.4.0, 4.5.0, 5.0.0, and 5.1.0. The vulnerability arises within the OAuth login flow, where the application fails to properly validate the redirect parameters after successful user authentication. Specifically, an attacker can craft a URL that, once the user authenticates, redirects them to an external, attacker-controlled website. This occurs because the redirect parameter is not sufficiently sanitized or restricted to trusted domains, allowing arbitrary URLs to be used. The primary risk is that attackers can exploit this behavior to conduct phishing attacks, leveraging the trust users place in Moodle's login process to redirect them to malicious sites that may harvest credentials or deliver malware. The vulnerability does not directly compromise confidentiality, integrity, or availability of Moodle itself but facilitates social engineering attacks. The CVSS v3.1 score is 3.5 (low), reflecting that the attack requires user interaction (clicking a malicious link), privileges to initiate OAuth login, and results in limited confidentiality impact without direct system compromise. No known exploits have been reported in the wild, and no patches are currently linked, indicating the need for vigilance and proactive mitigation. The flaw is particularly relevant for organizations relying on Moodle for e-learning and training, where users may be less security-aware and more susceptible to phishing. The vulnerability's exploitation scope is limited to users who authenticate via OAuth and follow attacker-crafted URLs.
Potential Impact
For European organizations, especially educational institutions and enterprises using Moodle as a learning management system, this vulnerability poses a risk primarily through phishing and social engineering attacks. Attackers can exploit the open redirect to lure authenticated users to malicious websites that mimic legitimate Moodle pages or other trusted services, potentially leading to credential theft, malware infection, or further compromise. While the vulnerability does not allow direct system intrusion or data breach, the indirect impact via phishing can result in unauthorized access if credentials are harvested. This can undermine user trust, cause reputational damage, and lead to compliance issues under GDPR if personal data is compromised. The impact is heightened in sectors with high Moodle usage, such as universities, vocational training centers, and corporate training departments across Europe. Since the vulnerability requires user interaction and OAuth login, the attack surface is limited but still significant given the widespread adoption of OAuth and Moodle in Europe.
Mitigation Recommendations
To mitigate CVE-2025-67852, organizations should implement strict validation of redirect URLs within the OAuth login flow, ensuring that only whitelisted, trusted domains are allowed as redirect targets. Moodle administrators should monitor for updates and apply patches as soon as they become available from Moodle security advisories. In the interim, consider disabling OAuth login methods if feasible or restricting OAuth redirect parameters via custom code or web application firewalls (WAFs) to prevent open redirects. User education is critical: train users to recognize suspicious URLs and avoid clicking on unexpected links, especially those received via email or messaging platforms. Implement multi-factor authentication (MFA) to reduce the risk of credential compromise even if phishing succeeds. Additionally, monitor logs for unusual redirect patterns or login anomalies that may indicate exploitation attempts. Network-level protections such as URL filtering and anti-phishing tools can also reduce exposure. Finally, conduct regular security assessments of the Moodle environment to identify and remediate similar issues proactively.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-67852: URL Redirection to Untrusted Site ('Open Redirect')
Description
CVE-2025-67852 is an open redirect vulnerability in Moodle's OAuth login flow affecting versions 4. 1. 0 through 5. 1. 0. The flaw allows remote attackers to redirect authenticated users to attacker-controlled websites due to insufficient validation of redirect parameters. This can facilitate phishing attacks by tricking users into believing they are interacting with legitimate Moodle services. The vulnerability has a low CVSS score of 3. 5, indicating limited direct impact but potential for social engineering exploitation. No known exploits are currently in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2025-67852 is an open redirect vulnerability identified in Moodle versions 4.1.0, 4.4.0, 4.5.0, 5.0.0, and 5.1.0. The vulnerability arises within the OAuth login flow, where the application fails to properly validate the redirect parameters after successful user authentication. Specifically, an attacker can craft a URL that, once the user authenticates, redirects them to an external, attacker-controlled website. This occurs because the redirect parameter is not sufficiently sanitized or restricted to trusted domains, allowing arbitrary URLs to be used. The primary risk is that attackers can exploit this behavior to conduct phishing attacks, leveraging the trust users place in Moodle's login process to redirect them to malicious sites that may harvest credentials or deliver malware. The vulnerability does not directly compromise confidentiality, integrity, or availability of Moodle itself but facilitates social engineering attacks. The CVSS v3.1 score is 3.5 (low), reflecting that the attack requires user interaction (clicking a malicious link), privileges to initiate OAuth login, and results in limited confidentiality impact without direct system compromise. No known exploits have been reported in the wild, and no patches are currently linked, indicating the need for vigilance and proactive mitigation. The flaw is particularly relevant for organizations relying on Moodle for e-learning and training, where users may be less security-aware and more susceptible to phishing. The vulnerability's exploitation scope is limited to users who authenticate via OAuth and follow attacker-crafted URLs.
Potential Impact
For European organizations, especially educational institutions and enterprises using Moodle as a learning management system, this vulnerability poses a risk primarily through phishing and social engineering attacks. Attackers can exploit the open redirect to lure authenticated users to malicious websites that mimic legitimate Moodle pages or other trusted services, potentially leading to credential theft, malware infection, or further compromise. While the vulnerability does not allow direct system intrusion or data breach, the indirect impact via phishing can result in unauthorized access if credentials are harvested. This can undermine user trust, cause reputational damage, and lead to compliance issues under GDPR if personal data is compromised. The impact is heightened in sectors with high Moodle usage, such as universities, vocational training centers, and corporate training departments across Europe. Since the vulnerability requires user interaction and OAuth login, the attack surface is limited but still significant given the widespread adoption of OAuth and Moodle in Europe.
Mitigation Recommendations
To mitigate CVE-2025-67852, organizations should implement strict validation of redirect URLs within the OAuth login flow, ensuring that only whitelisted, trusted domains are allowed as redirect targets. Moodle administrators should monitor for updates and apply patches as soon as they become available from Moodle security advisories. In the interim, consider disabling OAuth login methods if feasible or restricting OAuth redirect parameters via custom code or web application firewalls (WAFs) to prevent open redirects. User education is critical: train users to recognize suspicious URLs and avoid clicking on unexpected links, especially those received via email or messaging platforms. Implement multi-factor authentication (MFA) to reduce the risk of credential compromise even if phishing succeeds. Additionally, monitor logs for unusual redirect patterns or login anomalies that may indicate exploitation attempts. Network-level protections such as URL filtering and anti-phishing tools can also reduce exposure. Finally, conduct regular security assessments of the Moodle environment to identify and remediate similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fedora
- Date Reserved
- 2025-12-12T13:00:24.330Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69821b8cf9fa50a62fcf9c3a
Added to database: 2/3/2026, 4:00:12 PM
Last enriched: 2/3/2026, 4:15:33 PM
Last updated: 2/3/2026, 5:09:33 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1568: CWE-347 Improper Verification of Cryptographic Signature in Rapid7 Vulnerability Management
CriticalCVE-2025-67857: Insertion of Sensitive Information Into Sent Data
MediumCVE-2025-67856
MediumCVE-2025-67855: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
MediumCVE-2025-67853: Improper Restriction of Excessive Authentication Attempts
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.