CVE-2025-32044

A flaw has been identified in Moodle where, on certain sites, unauthenticated users could retrieve sensitive user data—including names, contact information, and hashed passwords—via stack traces returned by specific API calls. Sites with PHP configured with zend.exception_ignore_args = 1 in the php.ini file are not affected by this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*

History

24 Jun 2025, 16:16

Type Values Removed Values Added
First Time Moodle moodle
Moodle
References () https://access.redhat.com/security/cve/CVE-2025-32044 - () https://access.redhat.com/security/cve/CVE-2025-32044 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2356829 - () https://bugzilla.redhat.com/show_bug.cgi?id=2356829 - Issue Tracking
CPE cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*

29 Apr 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una falla en Moodle donde, en ciertos sitios, usuarios no autenticados podían recuperar datos confidenciales de usuario (como nombres, información de contacto y contraseñas cifradas) mediante seguimientos de pila devueltos por llamadas API específicas. Los sitios con PHP configurado con zend.exception_ignore_args = 1 en el archivo php.ini no se ven afectados por esta vulnerabilidad.

25 Apr 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-25 15:15

Updated : 2025-06-24 16:16


NVD link : CVE-2025-32044

Mitre link : CVE-2025-32044

CVE.ORG link : CVE-2025-32044


JSON object : View

Products Affected

moodle

  • moodle
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor