1+ {
2+ "schema_version" : " 1.4.0" ,
3+ "id" : " GHSA-qv78-6gpp-hm68" ,
4+ "modified" : " 2026-02-03T19:07:08Z" ,
5+ "published" : " 2026-02-03T12:30:29Z" ,
6+ "aliases" : [
7+ " CVE-2025-67852"
8+ ],
9+ "summary" : " Moodle Open Redirect vulnerability" ,
10+ "details" : " A flaw was found in Moodle. An Open Redirect vulnerability in the OAuth login flow allows a remote attacker to redirect users to attacker-controlled pages after they have successfully authenticated. This occurs due to insufficient validation of redirect parameters, which could lead to phishing attacks or information disclosure." ,
11+ "severity" : [
12+ {
13+ "type" : " CVSS_V3" ,
14+ "score" : " CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
15+ }
16+ ],
17+ "affected" : [
18+ {
19+ "package" : {
20+ "ecosystem" : " Packagist" ,
21+ "name" : " moodle/moodle"
22+ },
23+ "ranges" : [
24+ {
25+ "type" : " ECOSYSTEM" ,
26+ "events" : [
27+ {
28+ "introduced" : " 0"
29+ },
30+ {
31+ "fixed" : " 4.1.22"
32+ }
33+ ]
34+ }
35+ ]
36+ },
37+ {
38+ "package" : {
39+ "ecosystem" : " Packagist" ,
40+ "name" : " moodle/moodle"
41+ },
42+ "ranges" : [
43+ {
44+ "type" : " ECOSYSTEM" ,
45+ "events" : [
46+ {
47+ "introduced" : " 4.4.0-beta"
48+ },
49+ {
50+ "fixed" : " 4.4.12"
51+ }
52+ ]
53+ }
54+ ]
55+ },
56+ {
57+ "package" : {
58+ "ecosystem" : " Packagist" ,
59+ "name" : " moodle/moodle"
60+ },
61+ "ranges" : [
62+ {
63+ "type" : " ECOSYSTEM" ,
64+ "events" : [
65+ {
66+ "introduced" : " 4.5.0-beta"
67+ },
68+ {
69+ "fixed" : " 4.5.8"
70+ }
71+ ]
72+ }
73+ ]
74+ },
75+ {
76+ "package" : {
77+ "ecosystem" : " Packagist" ,
78+ "name" : " moodle/moodle"
79+ },
80+ "ranges" : [
81+ {
82+ "type" : " ECOSYSTEM" ,
83+ "events" : [
84+ {
85+ "introduced" : " 5.0.0-beta"
86+ },
87+ {
88+ "fixed" : " 5.0.4"
89+ }
90+ ]
91+ }
92+ ]
93+ },
94+ {
95+ "package" : {
96+ "ecosystem" : " Packagist" ,
97+ "name" : " moodle/moodle"
98+ },
99+ "ranges" : [
100+ {
101+ "type" : " ECOSYSTEM" ,
102+ "events" : [
103+ {
104+ "introduced" : " 5.1.0-beta"
105+ },
106+ {
107+ "fixed" : " 5.1.1"
108+ }
109+ ]
110+ }
111+ ]
112+ }
113+ ],
114+ "references" : [
115+ {
116+ "type" : " ADVISORY" ,
117+ "url" : " https://nvd.nist.gov/vuln/detail/CVE-2025-67852"
118+ },
119+ {
120+ "type" : " WEB" ,
121+ "url" : " https://github.com/moodle/moodle/commit/fa1624c8c9e3efa917f0e9d2666bb59d8be2a975"
122+ },
123+ {
124+ "type" : " WEB" ,
125+ "url" : " https://access.redhat.com/security/cve/CVE-2025-67852"
126+ },
127+ {
128+ "type" : " WEB" ,
129+ "url" : " https://bugzilla.redhat.com/show_bug.cgi?id=2423844"
130+ },
131+ {
132+ "type" : " PACKAGE" ,
133+ "url" : " https://github.com/moodle/moodle"
134+ },
135+ {
136+ "type" : " WEB" ,
137+ "url" : " https://moodle.org/mod/forum/discuss.php?d=471302"
138+ }
139+ ],
140+ "database_specific" : {
141+ "cwe_ids" : [
142+ " CWE-601"
143+ ],
144+ "severity" : " LOW" ,
145+ "github_reviewed" : true ,
146+ "github_reviewed_at" : " 2026-02-03T19:07:08Z" ,
147+ "nvd_published_at" : " 2026-02-03T11:15:55Z"
148+ }
149+ }
0 commit comments