GHSA-345q-9jmq-g9q4

Suggest an improvement
Source
https://github.com/advisories/GHSA-345q-9jmq-g9q4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-345q-9jmq-g9q4/GHSA-345q-9jmq-g9q4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-345q-9jmq-g9q4
Aliases
Published
2025-04-25T15:31:22Z
Modified
2025-04-25T17:42:26.486378Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Moodle allows unauthenticated REST API user data exposure
Details

A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data—including names, contact information, and hashed passwords—via stack traces returned by specific API calls. Sites where PHP is configured with zend.exceptionignoreargs = 'On' or zend.exceptionignoreargs = 1 in the relevant php.ini file are NOT affected by this vulnerability. Sites that do not have the zend.exceptionignoreargs setting enabled and are using the internal Moodle LMS authentication system are affected by this vulnerability.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2025-04-25T16:31:47Z",
    "nvd_published_at": "2025-04-25T15:15:36Z",
    "cwe_ids": [
        "CWE-200"
    ],
    "severity": "HIGH"
}
References

Affected packages

Packagist / moodle/moodle

Package

Name
moodle/moodle
Purl
pkg:composer/moodle/moodle

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.5.0-beta
Fixed
4.5.3

Affected versions

v4.*

v4.5.0-beta
v4.5.0-rc1
v4.5.0-rc2
v4.5.0
v4.5.1
v4.5.2