{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-67848","assignerOrgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","state":"PUBLISHED","assignerShortName":"fedora","dateReserved":"2025-12-12T13:00:24.330Z","datePublished":"2026-02-03T10:51:58.208Z","dateUpdated":"2026-02-26T15:04:29.026Z"},"containers":{"cna":{"title":"Moodle: moodle: authentication bypass via lti provider allows suspended users to gain unauthorized access.","metrics":[{"other":{"content":{"value":"Important","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in Moodle. This authentication bypass vulnerability allows suspended users to authenticate through the Learning Tools Interoperability (LTI) Provider. The issue arises from the LTI authentication handlers failing to enforce the user's suspension status, enabling unauthorized access to the system. This can lead to information disclosure or other unauthorized actions by users who should be restricted."}],"affected":[{"versions":[{"status":"affected","version":"4.1.0","lessThan":"4.1.22","versionType":"semver"},{"status":"affected","version":"4.4.0","lessThan":"4.4.12","versionType":"semver"},{"status":"affected","version":"4.5.0","lessThan":"4.5.8","versionType":"semver"},{"status":"affected","version":"5.0.0","lessThan":"5.0.4","versionType":"semver"},{"status":"affected","version":"5.1.0","lessThan":"5.1.1","versionType":"semver"}],"packageName":"moodle","collectionURL":"https://github.com/moodle/moodle/","defaultStatus":"unaffected"}],"references":[{"url":"https://access.redhat.com/security/cve/CVE-2025-67848","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423831","name":"RHBZ#2423831","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://moodle.org/mod/forum/discuss.php?d=471298"}],"datePublic":"2025-12-15T04:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-280","description":"Improper Handling of Insufficient Permissions or Privileges","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-280: Improper Handling of Insufficient Permissions or Privileges","timeline":[{"lang":"en","time":"2025-12-19T11:53:00.333Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-12-15T04:00:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"Red Hat would like to thank Attilio Ferrari for reporting this issue."}],"providerMetadata":{"orgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","shortName":"fedora","dateUpdated":"2026-02-03T10:51:58.208Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-67848","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-02-04T04:55:50.922048Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T15:04:29.026Z"}}]}}