UBUNTU-CVE-2025-53021

Source
https://ubuntu.com/security/CVE-2025-53021
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-53021.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2025-53021
Related
Published
2025-06-24T20:15:00Z
Modified
2025-06-26T17:24:35Z
Severity
  • 4.2 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A session fixation vulnerability in Moodle 3.x through 3.11.18 allows unauthenticated attackers to hijack user sessions via the sesskey parameter. The sesskey can be obtained without authentication and reused within the OAuth2 login flow, resulting in the victim's session being linked to the attacker's. Successful exploitation results in full account takeover. According to the Moodle Releases page, "Bug fixes for security issues in 3.11.x ended 11 December 2023." NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

References

Affected packages

Ubuntu:Pro:16.04:LTS / moodle

Package

Name
moodle
Purl
pkg:deb/ubuntu/moodle@3.0.3+dfsg-0ubuntu1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.7.9+dfsg-1
2.7.10+dfsg-1
2.7.11+dfsg-1
2.7.11+dfsg-2
2.7.12+dfsg-1

3.*

3.0.3+dfsg-0ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / moodle

Package

Name
moodle
Purl
pkg:deb/ubuntu/moodle@3.0.3+dfsg-0ubuntu1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0.3+dfsg-0ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}