Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67856

0
Medium
VulnerabilityCVE-2025-67856cvecve-2025-67856
Published: Tue Feb 03 2026 (02/03/2026, 10:52:19 UTC)
Source: CVE Database V5

Description

CVE-2025-67856 is an authorization logic vulnerability in Moodle affecting versions 4. 1. 0 through 5. 1. 0. The flaw arises from incomplete role checks during the badge awarding process, allowing unauthorized users to obtain badges they are not entitled to. This can lead to privilege escalation or unauthorized access to features tied to badge ownership. The vulnerability has a CVSS score of 5. 4 (medium severity), requires network access with low complexity, and needs privileges but no user interaction. No known exploits are currently in the wild.

AI-Powered Analysis

AILast updated: 02/03/2026, 16:15:02 UTC

Technical Analysis

CVE-2025-67856 is a medium severity authorization logic vulnerability identified in Moodle versions 4.1.0, 4.4.0, 4.5.0, 5.0.0, and 5.1.0. The flaw stems from incomplete role verification during the badge awarding process, which is a feature used to recognize user achievements within the platform. Specifically, the system fails to properly check whether the user awarding the badge has the necessary permissions, allowing unauthorized users to grant themselves or others badges without proper authorization. Since badges can be linked to access privileges or elevated roles, this unauthorized badge granting can lead to privilege escalation or unauthorized access to restricted features or content. The vulnerability is exploitable remotely over the network with low attack complexity, requiring the attacker to have some privileges but no user interaction is needed. Although no known exploits are currently reported in the wild, the flaw presents a risk especially in environments where badge assignments correlate with access control. The vulnerability was published on February 3, 2026, and has a CVSS v3.1 score of 5.4, reflecting limited confidentiality and integrity impacts but no availability impact. The flaw is rooted in authorization logic errors, a common and critical class of security issues that can undermine trust in access control mechanisms.

Potential Impact

For European organizations, especially educational institutions, government agencies, and enterprises using Moodle as their learning management system, this vulnerability could allow unauthorized users to escalate privileges by illegitimately awarding themselves badges. This could lead to unauthorized access to sensitive course materials, administrative features, or other restricted functionalities tied to badge ownership. The impact includes potential data confidentiality breaches, integrity violations through unauthorized changes, and erosion of trust in the platform's security. Since Moodle is widely used across Europe in public and private sectors, exploitation could disrupt training programs, compliance tracking, and certification processes. Although the vulnerability does not affect availability, the unauthorized privilege escalation could facilitate further attacks or data misuse. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released.

Mitigation Recommendations

Organizations should monitor Moodle vendor advisories and apply security patches promptly once released to address CVE-2025-67856. Until patches are available, administrators should audit and restrict badge awarding permissions to the minimum necessary trusted roles, ensuring only authorized personnel can assign badges. Implement role-based access control reviews focusing on badge-related capabilities to detect and remove excessive privileges. Enable detailed logging and monitoring of badge assignment activities to detect suspicious or unauthorized badge grants. Consider temporarily disabling badge awarding features if feasible in high-risk environments. Conduct user training to raise awareness about the risk of privilege escalation through badge misuse. Additionally, integrate Moodle with centralized identity and access management systems to enforce consistent authorization policies. Regularly review and update security configurations to minimize attack surface related to badge management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-12-12T13:00:24.330Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69821b8cf9fa50a62fcf9c46

Added to database: 2/3/2026, 4:00:12 PM

Last enriched: 2/3/2026, 4:15:02 PM

Last updated: 2/3/2026, 5:07:46 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats