-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| moodle/moodle | composer | >= 4.4.0-beta, < 4.4.1 | 4.4.1 |
| moodle/moodle | composer | >= 4.3.0-beta, < 4.3.5 | 4.3.5 |
| moodle/moodle | composer | >= 4.2.0-beta, < 4.2.8 | 4.2.8 |
| moodle/moodle | composer | < 4.1.11 | 4.1.11 |
The vulnerability stems from the missing 'can_join()' check in the execute() method of get_join_url.php. The patch explicitly adds this capability check and throws restricted_context_exception when unauthorized. The test case modification in get_join_url_test.php confirms this was the attack vector by testing prohibited users. The function's purpose (generating join URLs) and the CWE-284 classification directly map to this missing access control in the execute() method.
Ongoing coverage of React2Shell