CVE-2024-34009: Moodle ReCAPTCHA can be bypassed on the login page
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.47324%
CWE
Published
5/31/2024
Updated
8/2/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | >= 4.3.0, < 4.3.4 | 4.3.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability specifically affects the login page's ReCAPTCHA implementation. Moodle's architecture typically handles form submissions through centralized scripts like login/index.php. The description indicates missing enablement checks - a classic input validation flaw (CWE-20). While exact code isn't available, the pattern matches login form handlers that would need to: 1) Check if ReCAPTCHA is enabled in system config 2) Validate ReCAPTCHA response if enabled. The bypass suggests step 1 was missing in the submission path. The first patched version (4.3.4) and vulnerability range (≥4.3.0) align with recent authentication flow changes.