ghsa-cgvv-3455-824j
Vulnerability from github
Published
2025-06-24 21:30
Modified
2025-06-26 14:12
Severity ?
VLAI Severity ?
Summary
Moodle Session Fixation allows unauthenticated users to hijack sessions via sesskey parameter
Details
A session fixation vulnerability in Moodle 3.x through 3.11.18 allows unauthenticated attackers to hijack user sessions via the sesskey parameter. The sesskey can be obtained without authentication and reused within the OAuth2 login flow, resulting in the victim's session being linked to the attacker's. Successful exploitation results in full account takeover. According to the Moodle Releases page, "Bug fixes for security issues in 3.11.x ended 11 December 2023." NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 3.11.18" }, "package": { "ecosystem": "Packagist", "name": "moodle/moodle" }, "ranges": [ { "events": [ { "introduced": "3.0.0" }, { "fixed": "4.0.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-53021" ], "database_specific": { "cwe_ids": [ "CWE-384" ], "github_reviewed": true, "github_reviewed_at": "2025-06-26T14:12:34Z", "nvd_published_at": "2025-06-24T20:15:26Z", "severity": "MODERATE" }, "details": "A session fixation vulnerability in Moodle 3.x through 3.11.18 allows unauthenticated attackers to hijack user sessions via the sesskey parameter. The sesskey can be obtained without authentication and reused within the OAuth2 login flow, resulting in the victim\u0027s session being linked to the attacker\u0027s. Successful exploitation results in full account takeover. According to the Moodle Releases page, \"Bug fixes for security issues in 3.11.x ended 11 December 2023.\" NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", "id": "GHSA-cgvv-3455-824j", "modified": "2025-06-26T14:12:34Z", "published": "2025-06-24T21:30:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53021" }, { "type": "PACKAGE", "url": "https://github.com/moodle/moodle" }, { "type": "WEB", "url": "https://github.com/moodle/moodle/releases/tag/v3.11.18" }, { "type": "WEB", "url": "https://moodledev.io/general/releases#moodle-311" }, { "type": "WEB", "url": "https://rentry.co/moodle-oauth2-cve" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "Moodle Session Fixation allows unauthenticated users to hijack sessions via sesskey parameter" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…