Session Fixation Affecting moodle/moodle package, versions >=3.0.0, <4.0.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.14% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-MOODLEMOODLE-11335860
  • published30 Jul 2025
  • disclosed24 Jun 2025
  • creditye_code

Introduced: 24 Jun 2025

CVE-2025-53021  (opens in a new tab)
CWE-384  (opens in a new tab)

How to fix?

Upgrade moodle/moodle to version 4.0.0 or higher.

Overview

moodle/moodle is a learning platform.

Affected versions of this package are vulnerable to Session Fixation via the sesskey parameter. An attacker can gain unauthorized access to another user's session by obtaining and reusing the sesskey within the OAuth2 login flow, resulting in the victim's session being linked to the attacker's and potentially leading to full account takeover.

Notes:

  1. The issue was resolved as part of improvements to the OAuth flow login that were implemented in version 4.0.0
  2. Bug fixes for security issues in 3.11.x ended 11 December 2023, so a fix was not backported.

CVSS Base Scores

version 4.0
version 3.1