CVE-2025-26533: Moodle has a SQL injection risk in course search module list filter
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22176%
CWE
Published
2/24/2025
Updated
2/24/2025
KEV Status
No
Technology PHP
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version | 
|---|---|---|---|
| moodle/moodle | composer | >= 4.5.0-beta, < 4.5.2 | 4.5.2 | 
| moodle/moodle | composer | >= 4.4.0-beta, < 4.4.6 | 4.4.6 | 
| moodle/moodle | composer | >= 4.3.0-beta, < 4.3.10 | 4.3.10 | 
| moodle/moodle | composer | < 4.1.16 | 4.1.16 | 
Vulnerability Intelligence Miggo AI
Miggo AI
 Root Cause Analysis
Root Cause Analysis
The commit MDL-84271 specifically mentions adding validation for the module list in course search. This indicates the vulnerability existed in code that processes module filter parameters for SQL queries. The core_course component's search functionality would handle these filters, and the lack of validation in query-building functions would expose SQL injection. While exact pre-patch code isn't available, the pattern matches common SQL injection vectors in search filters using dynamic IN() clauses with user input.