We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53021



Description

A session fixation vulnerability in Moodle 3.x through 3.11.18 allows unauthenticated attackers to hijack user sessions via the sesskey parameter. The sesskey can be obtained without authentication and reused within the OAuth2 login flow, resulting in the victim's session being linked to the attacker's. Successful exploitation results in full account takeover. According to the Moodle Releases page, "Bug fixes for security issues in 3.11.x ended 11 December 2023." NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Reserved 2025-06-24 | Published 2025-06-24 | Updated 2025-06-24 | Assigner mitre


MEDIUM: 4.2CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

Problem types

CWE-384 Session Fixation

Product status

Default status
unknown

3
affected

References

rentry.co/moodle-oauth2-cve

github.com/moodle/moodle/releases/tag/v3.11.18

moodledev.io/general/releases

cve.org (CVE-2025-53021)

nvd.nist.gov (CVE-2025-53021)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53021

Support options

Helpdesk Chat, Email, Knowledgebase