CVE-2015-2272: Moodle allows attackers to bypass a forced-password-change requirement
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.5136%
CWE
-
Published
5/13/2022
Updated
1/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | < 2.6.9 | 2.6.9 |
moodle/moodle | composer | >= 2.7.0, < 2.7.6 | 2.7.6 |
moodle/moodle | composer | >= 2.8.0, < 2.8.4 | 2.8.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing authorization checks in the token generation endpoint. The patch adds a critical check for 'auth_forcepasswordchange' user preference using get_user_preferences() before allowing token creation. In vulnerable versions, this check was absent in login/token.php, allowing users to create persistent web service tokens even when required to change their password. The main vulnerable code path is the token generation workflow in login/token.php prior to the security check being implemented.