CVE-2024-48897: moodle: IDOR in edit/delete RSS feed
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.28584%
CWE
Published
11/18/2024
Updated
11/20/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| moodle/moodle | composer | < 4.1.14 | 4.1.14 |
| moodle/moodle | composer | >= 4.2.0, < 4.2.11 | 4.2.11 |
| moodle/moodle | composer | >= 4.3.0, < 4.3.8 | 4.3.8 |
| moodle/moodle | composer | >= 4.4.0, < 4.4.4 | 4.4.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing authorization checks in RSS feed management operations. Moodle's RSS functionality typically involves block/rss_client components and core RSS libraries. Functions like block_rss_client_edit_action (handling edit/delete requests) and rss_delete_feed (core deletion logic) are prime candidates because:
- IDOR vulnerabilities often occur in CRUD operations lacking ownership/context checks
- The CWE-285/863 alignment indicates missing capability checks (e.g., require_capability('block/rss_client:managefeeds'))
- Historical Moodle vulnerabilities in RSS modules often involve these components Confidence is medium due to lack of direct patch/diff access, but matches the described vulnerability pattern.