First published: Fri Apr 25 2025(Updated: )
A flaw was found in Moodle. The analysis request action in the Brickfield tool did not include the necessary token to prevent a Cross-site request forgery (CSRF) risk.
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=4.5.0-beta<4.5.4 | 4.5.4 |
composer/moodle/moodle | >=4.4.0-beta<4.4.8 | 4.4.8 |
composer/moodle/moodle | >=4.3.0-beta<4.3.12 | 4.3.12 |
composer/moodle/moodle | <4.1.18 | 4.1.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The GHSA-m8qh-hx4c-h9hr vulnerability is classified as a risk factor for Cross-site request forgery (CSRF) in Moodle.
To fix GHSA-m8qh-hx4c-h9hr, upgrade Moodle to version 4.5.4, 4.4.8, 4.3.12, or 4.1.18.
The affected versions of Moodle include 4.5.0-beta to 4.5.4, 4.4.0-beta to 4.4.8, 4.3.0-beta to 4.3.12, and all versions prior to 4.1.18.
GHSA-m8qh-hx4c-h9hr is a Cross-site request forgery (CSRF) vulnerability.
There is no specific workaround for GHSA-m8qh-hx4c-h9hr, and updating to a secure version is recommended.