Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67853: Improper Restriction of Excessive Authentication Attempts

0
High
VulnerabilityCVE-2025-67853cvecve-2025-67853
Published: Tue Feb 03 2026 (02/03/2026, 10:52:12 UTC)
Source: CVE Database V5

Description

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks against user accounts.

AI-Powered Analysis

AILast updated: 02/27/2026, 15:52:49 UTC

Technical Analysis

CVE-2025-67853 is a vulnerability identified in the Moodle learning management system versions 4.1.0, 4.4.0, 4.5.0, 5.0.0, and 5.1.0. The issue arises from an improper restriction of excessive authentication attempts specifically in the confirmation email service component. This service lacks adequate rate limiting controls, allowing remote attackers to repeatedly trigger confirmation email requests without restriction. Consequently, attackers can perform brute-force attacks or user enumeration attacks by guessing or verifying user credentials through repeated requests. The vulnerability does not require any prior authentication or user interaction, making it exploitable over the network with low complexity. The primary impact is on confidentiality, as attackers can discover valid usernames or email addresses, potentially leading to further targeted attacks or account compromise. The flaw does not directly affect the integrity or availability of the system. Although no known exploits have been reported in the wild, the vulnerability's characteristics and high CVSS score (7.5) indicate a significant risk if left unmitigated. The vulnerability was published in early 2026 and assigned by Fedora, with no patches explicitly linked in the provided data, suggesting that organizations should monitor official Moodle advisories for updates. The lack of rate limiting in a critical authentication-related service highlights a common security oversight in web applications that can facilitate credential stuffing and brute-force attacks.

Potential Impact

The vulnerability primarily threatens the confidentiality of user credentials by enabling attackers to enumerate valid users and perform brute-force password guessing attacks remotely without authentication or user interaction. This can lead to unauthorized access to user accounts, potentially exposing sensitive educational data, personal information, and administrative controls within Moodle environments. Organizations relying on Moodle for education, training, or administrative purposes may face increased risks of account compromise, data breaches, and subsequent lateral movement within their networks. Although the vulnerability does not directly impact system integrity or availability, compromised accounts can be leveraged for privilege escalation or to distribute malware. The absence of known exploits in the wild currently limits immediate widespread impact, but the ease of exploitation and high prevalence of Moodle in educational institutions worldwide make this a significant threat. Failure to address this vulnerability could also erode user trust and lead to regulatory compliance issues related to data protection laws.

Mitigation Recommendations

Organizations should immediately verify their Moodle installations against the affected versions and apply any official patches or updates released by Moodle as soon as they become available. In the absence of patches, administrators should implement strict rate limiting on the confirmation email service endpoint to prevent excessive authentication attempts. This can be achieved through web application firewalls (WAFs), reverse proxies, or custom application-level controls that limit the number of confirmation email requests per IP address or user within a defined time window. Additionally, enabling multi-factor authentication (MFA) for user accounts can reduce the risk of unauthorized access even if credentials are compromised. Monitoring logs for unusual spikes in confirmation email requests or failed login attempts can help detect exploitation attempts early. User education on strong password policies and awareness of phishing attempts should complement technical controls. Finally, organizations should maintain up-to-date incident response plans to quickly address any account compromises resulting from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-12-12T13:00:24.330Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69821b8cf9fa50a62fcf9c3e

Added to database: 2/3/2026, 4:00:12 PM

Last enriched: 2/27/2026, 3:52:49 PM

Last updated: 3/20/2026, 4:39:49 PM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses