Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Moodle Project | moodle | 4.5.0 ~ 4.5.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Environment used to find Moodle CVE-2025-26529 | https://github.com/NightBloodz/moodleTestingEnv | POC Details |
| 2 | SSRF to XSS - XSS to RCE Moodle | https://github.com/Astroo18/PoC-CVE-2025-26529 | POC Details |
| 3 | Web CTF challenge highlighting moodle CVE-2025-26529 (in 2 flavors) | https://github.com/hxuu/moodle-cve | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-26525 | 8.6 HIGH | Arbitrary file read risk through pdfTeX |
| CVE-2025-26530 | 8.3 HIGH | Reflected XSS via question bank filter |
| CVE-2025-26533 | 8.1 HIGH | SQL injection risk in course search module list filter |
| CVE-2025-26526 | 6.5 MEDIUM | Feedback response viewing and deletions did not respect Separate Groups mode |
| CVE-2025-26527 | 5.3 MEDIUM | Non-searchable tags can still be discovered on the tag search page and in the tags block |
| CVE-2025-26528 | 3.4 LOW | Stored XSS in ddimageortext question type |
| CVE-2025-26532 | 3.1 LOW | Teachers can evade trusttext config when restoring glossary entries |
| CVE-2025-26531 | 3.1 LOW | IDOR in badges allows disabling of arbitrary badges |
No comments yet