Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5cx4-w4fh-fr57 | Moodle Affected by Improper Restriction of Excessive Authentication Attempts |
Wed, 11 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:* cpe:2.3:a:moodle:moodle:5.1.0:-:*:*:*:*:*:* |
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Moodle
Moodle moodle |
|
| Vendors & Products |
Moodle
Moodle moodle |
Tue, 03 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Moodle. A remote attacker could exploit a lack of proper rate limiting in the confirmation email service. This vulnerability allows attackers to more easily enumerate or guess user credentials, facilitating brute-force attacks against user accounts. | |
| Title | Moodle: moodle: brute-force facilitation due to missing rate limiting in confirmation email service | |
| Weaknesses | CWE-307 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2026-02-03T15:43:49.951Z
Reserved: 2025-12-12T13:00:24.330Z
Link: CVE-2025-67853
Updated: 2026-02-03T15:43:46.563Z
Status : Analyzed
Published: 2026-02-03T11:15:55.663
Modified: 2026-02-11T18:32:38.980
Link: CVE-2025-67853
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:14:50Z
Github GHSA