Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67857: Insertion of Sensitive Information Into Sent Data

0
Medium
VulnerabilityCVE-2025-67857cvecve-2025-67857
Published: Tue Feb 03 2026 (02/03/2026, 10:52:22 UTC)
Source: CVE Database V5

Description

CVE-2025-67857 is a medium-severity vulnerability in Moodle versions 4. 1. 0 through 5. 1. 0 where user identifiers are exposed in URLs during anonymous assignment submissions. This exposure compromises the anonymity of users by leaking internal user IDs to unauthorized viewers. The flaw does not allow modification or deletion of data but risks confidentiality by revealing sensitive user information. Exploitation requires no privileges but does require user interaction (viewing or sharing URLs). No known exploits are currently in the wild. European educational institutions using affected Moodle versions may face privacy compliance challenges and reputational damage.

AI-Powered Analysis

AILast updated: 02/03/2026, 16:14:47 UTC

Technical Analysis

CVE-2025-67857 is a vulnerability identified in Moodle, a widely used open-source learning management system, affecting versions 4.1.0 through 5.1.0. The flaw arises during anonymous assignment submissions where internal user identifiers are inadvertently embedded in URLs sent or displayed to users. This results in unintended exposure of sensitive user information, specifically internal user IDs, which compromises the anonymity intended in these assignment submissions. The vulnerability is classified with a CVSS 3.1 base score of 4.3 (medium severity), reflecting that it impacts confidentiality but not integrity or availability. The attack vector is network-based with low complexity and no privileges required; however, user interaction is necessary as the attacker must access or intercept the URLs containing the sensitive data. Although no known exploits have been reported in the wild, the exposure of internal identifiers could facilitate further targeted attacks or privacy violations. The flaw does not allow unauthorized modification or deletion of data but poses a risk of information disclosure that could violate data protection regulations. The vulnerability was publicly disclosed in early 2026 and is assigned by Fedora’s security team. No official patches or mitigation links were provided at the time of disclosure, indicating that organizations should monitor Moodle updates closely. The issue primarily affects the confidentiality of user data within educational environments relying on Moodle for assignment submissions, particularly where anonymity is a critical feature.

Potential Impact

For European organizations, especially educational institutions and universities using Moodle, this vulnerability poses a risk to user privacy and data protection compliance. The inadvertent exposure of internal user IDs during anonymous submissions undermines the anonymity guarantees often required by academic policies and European data protection laws such as the GDPR. This could lead to reputational damage, loss of trust from students and staff, and potential regulatory penalties if personal data is considered exposed. Although the vulnerability does not allow data modification or system disruption, the confidentiality breach could be leveraged for profiling or targeted phishing attacks. The impact is heightened in countries with stringent privacy regulations and active enforcement. Additionally, the exposure could affect collaborative or cross-border educational programs that rely on Moodle, complicating compliance with multiple jurisdictions. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed proactively to prevent future exploitation and maintain compliance.

Mitigation Recommendations

Organizations should prioritize upgrading Moodle installations to versions beyond 5.1.0 once official patches addressing CVE-2025-67857 are released. Until patches are available, administrators should audit and restrict access to URLs generated during anonymous assignment submissions, ensuring they are not inadvertently shared or logged in publicly accessible locations. Implementing URL tokenization or anonymization techniques to avoid embedding internal user identifiers in URLs can reduce exposure. Monitoring web server logs and network traffic for unusual access patterns to assignment submission URLs may help detect attempted exploitation. Educating users and staff about the sensitivity of assignment submission URLs and discouraging sharing can mitigate risk. Additionally, reviewing Moodle configuration settings related to user anonymity and submission workflows may identify interim controls. Collaboration with Moodle community and security teams to track patch releases and advisories is essential. Finally, documenting the vulnerability and mitigation steps supports compliance audits and incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-12-12T13:00:24.331Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69821b8cf9fa50a62fcf9c4a

Added to database: 2/3/2026, 4:00:12 PM

Last enriched: 2/3/2026, 4:14:47 PM

Last updated: 2/3/2026, 5:04:34 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats