BIT-moodle-2025-67853

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/moodle/BIT-moodle-2025-67853.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-moodle-2025-67853
Aliases
Published
2026-02-12T08:51:08.996Z
Modified
2026-02-12T09:26:17.043999Z
Summary
Moodle: moodle: brute-force facilitation due to missing rate limiting in confirmation email service
Details

A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks against user accounts.

Database specific
{
    "cpes": [
        "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / moodle

Package

Name
moodle
Purl
pkg:bitnami/moodle

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.22
Introduced
4.4.0
Fixed
4.4.11
Introduced
4.5.0
Fixed
4.5.8
Introduced
5.0.0
Fixed
5.0.4
Introduced
5.1.0
Fixed
5.1.1

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/moodle/BIT-moodle-2025-67853.json"