CVE-2025-53021
PHP vulnerability analysis and mitigation

Overview

A session fixation vulnerability (CVE-2025-53021) was discovered in Moodle 3.x through 3.11.18 on June 24, 2025. The vulnerability affects unsupported versions of the Moodle learning management system and allows unauthenticated attackers to hijack user sessions through manipulation of the sesskey parameter (NVD, Wiz).

Technical details

The vulnerability exists in the OAuth2 login flow where the sesskey parameter can be obtained without authentication. An attacker can create a session, extract the sesskey value, and craft a malicious OAuth2 login URL. The vulnerability has been assigned a CVSS v3.1 score of 4.2 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N and is classified as CWE-384 (Session Fixation) (NVD, Wiz).

Impact

Successful exploitation of this vulnerability results in full account takeover of the victim's Moodle account. The attacker can gain unauthorized access to the victim's account and all associated course materials, personal information, and learning resources (NVD, Moodle OAuth2 CVE).

Mitigation and workarounds

As this vulnerability affects versions that are no longer supported by the maintainer (Moodle 3.x through 3.11.18), there is no official patch available. According to the Moodle Releases page, bug fixes for security issues in 3.11.x ended December 11, 2023. Organizations still running affected versions should upgrade to a supported version of Moodle (NVD, Moodle Releases).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management