Moodle 4.1.x < 4.1.5 Multiple Vulnerabilities

low Web App Scanning Plugin ID 114742

Synopsis

Moodle 4.1.x < 4.1.5 Multiple Vulnerabilities

Description

According to its self-reported version, the Moodle install hosted on the remote host is prior to 3.9.23, 3.11.x prior to 3.11.16, 4.0.x prior to 4.0.10, 4.1.x prior to 4.1.5 or 4.2.x prior to 4.2.2. It is, therefore, affected by multiple vulnerabilities.

- Insufficient limitations made it possible for students to bypass sequential navigation during a quiz attempt.

- Insufficient capability checks resulted in competency framework tools being available to users without the relevant capability.

- The admin view all policies page URL required additional sanitizing to prevent an open redirect risk.

- Insufficient capability checks made it possible to fetch other users' message processor preferences data.

- It was possible to escalate stored self-XSS to stored XSS where users login via OAuth 2.

- Permission overrides on individual blocks in the system dashboard did not cascade to user dashboards.

- A remote code execution risk was identified where file repository reference properties are parsed.

- Incorrect domain matching logic made it possible to bypass the proxy, which could result in access to hosts intended to be blocked by the proxy.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Moodle version 4.1.5 or later.

See Also

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66212

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71728

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74289

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78340

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78647

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78685

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78763

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78792

https://moodle.org/mod/forum/discuss.php?d=449640#p1807042

https://moodle.org/mod/forum/discuss.php?d=449641#p1807043

https://moodle.org/mod/forum/discuss.php?d=449642#p1807044

https://moodle.org/mod/forum/discuss.php?d=449644#p1807048

https://moodle.org/mod/forum/discuss.php?d=449647#p1807051

https://moodle.org/mod/forum/discuss.php?d=449649#p1807054

https://moodle.org/mod/forum/discuss.php?d=449650#p1807055

https://moodle.org/mod/forum/discuss.php?d=449651#p1807056

Plugin Details

Severity: Low

ID: 114742

Type: remote

Published: 4/10/2025

Updated: 4/10/2025

Scan Template: basic, full, pci, scan

Risk Information

CVSS v2

Risk Factor: Low

Base Score: 3.5

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Low

Base Score: 3.1

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 8/21/2023

Reference Information

CVE: CVE-2023-40316, CVE-2023-40317, CVE-2023-40318, CVE-2023-40320, CVE-2023-40322, CVE-2023-40323, CVE-2023-40324, CVE-2023-40325