Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67855: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

0
Medium
VulnerabilityCVE-2025-67855cvecve-2025-67855
Published: Tue Feb 03 2026 (02/03/2026, 10:52:15 UTC)
Source: CVE Database V5

Description

A flaw was found in mooodle. A remote attacker could exploit a reflected Cross-Site Scripting (XSS) vulnerability in the policy tool return URL. This vulnerability arises from insufficient sanitization of URL parameters, allowing attackers to inject malicious scripts through specially crafted links. Successful exploitation could lead to information disclosure or arbitrary client-side script execution within the user's browser.

AI-Powered Analysis

AILast updated: 02/27/2026, 15:53:10 UTC

Technical Analysis

CVE-2025-67855 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the Moodle platform, versions 4.1.0 through 5.1.0. The vulnerability is located in the policy tool return URL, where insufficient input sanitization allows an attacker to inject malicious JavaScript code via specially crafted URL parameters. When a user clicks on such a malicious link, the injected script executes within the context of the user's browser session, potentially leading to theft of session cookies, user impersonation, or disclosure of sensitive information accessible through the browser. This vulnerability does not require any authentication and can be exploited remotely, but it does require user interaction (clicking a link). The CVSS 3.1 base score of 5.4 reflects a medium severity, considering the attack vector is network-based, with low attack complexity, no privileges required, but requiring user interaction. The vulnerability affects multiple recent Moodle versions, which are widely used in educational institutions globally. Although no known exploits have been reported in the wild, the presence of this vulnerability poses a risk to confidentiality and integrity of user data within affected Moodle installations. The lack of patches or official mitigation links in the provided data suggests that organizations should monitor vendor advisories closely and implement interim mitigations.

Potential Impact

The primary impact of CVE-2025-67855 is on the confidentiality and integrity of user data within affected Moodle environments. Successful exploitation allows attackers to execute arbitrary scripts in the context of a victim's browser session, potentially leading to session hijacking, theft of authentication tokens, or unauthorized actions performed on behalf of the user. This can result in unauthorized access to sensitive educational records, personal information, or administrative functions. While the vulnerability does not directly affect system availability, the compromise of user accounts can lead to broader security incidents, including privilege escalation or lateral movement if combined with other vulnerabilities. Educational institutions and organizations relying on Moodle for e-learning are particularly at risk, as attackers may target students, educators, or administrators. The requirement for user interaction limits the scope somewhat but does not eliminate risk, especially in phishing-prone environments. The medium CVSS score reflects a moderate risk, but the widespread use of Moodle and the sensitivity of educational data elevate the potential impact.

Mitigation Recommendations

Organizations should immediately verify if their Moodle installations are running affected versions (4.1.0 through 5.1.0) and prioritize upgrading to patched versions once available. In the absence of official patches, administrators should implement input validation and output encoding on URL parameters, especially those used in the policy tool return URL, to neutralize malicious scripts. Employing a Content Security Policy (CSP) can help restrict the execution of unauthorized scripts in browsers. Additionally, educating users about the risks of clicking untrusted links and implementing web application firewalls (WAFs) with rules to detect and block reflected XSS payloads can reduce exploitation likelihood. Monitoring logs for suspicious URL parameters and anomalous user activity can aid in early detection. Regular security assessments and penetration testing focused on web application vulnerabilities should be conducted. Finally, ensure that session cookies are flagged as HttpOnly and Secure to mitigate session theft risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-12-12T13:00:24.330Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69821b8cf9fa50a62fcf9c42

Added to database: 2/3/2026, 4:00:12 PM

Last enriched: 2/27/2026, 3:53:10 PM

Last updated: 3/20/2026, 6:14:05 PM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses