
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2024-25979) affects Moodle, a Course Management System, where the forum search functionality accepted uncontrolled URL parameters. The issue was discovered in early 2024 and affects Moodle versions 4.3.0 to 4.3.2, 4.2.0 to 4.2.5, and 4.1.0 to 4.1.8, along with earlier unsupported versions. The vulnerability was patched in versions 4.3.3, 4.2.6, and 4.1.9 (Moodle Advisory, NVD).
The vulnerability is classified with a CVSS v3.1 Base Score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. The issue stems from insufficient parameter validation in the forum search functionality, where URL parameters were not properly restricted to allowed values. The vulnerability is categorized under CWE-233 (Improper Handling of Parameters) (NVD).
The vulnerability could potentially allow remote attackers to manipulate forum search functionality through unauthorized URL parameters, though the impact is considered minor according to the official security advisory (Moodle Advisory).
The recommended mitigation is to upgrade to the fixed versions: Moodle 4.3.3, 4.2.6, or 4.1.9. The fix has been implemented and can be found in the official Moodle git repository (Moodle Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."