Search for vulnerabilities
Vulnerability ID | VCID-6p7p-7qpy-9ubk |
Aliases |
CVE-2024-34009
GHSA-gwf6-q6c2-94p3 |
Summary | Moodle ReCAPTCHA can be bypassed on the login page Insufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilized. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 8.0 |
Risk | 4.0 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
cvssv3.1 | 7.5 | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-81463 |
generic_textual | HIGH | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-81463 |
epss | 0.0024 | https://api.first.org/data/v1/epss?cve=CVE-2024-34009 |
epss | 0.0024 | https://api.first.org/data/v1/epss?cve=CVE-2024-34009 |
cvssv3.1_qr | HIGH | https://github.com/advisories/GHSA-gwf6-q6c2-94p3 |
cvssv3.1 | 7.5 | https://github.com/moodle/moodle |
generic_textual | HIGH | https://github.com/moodle/moodle |
cvssv3.1 | 7.5 | https://moodle.org/mod/forum/discuss.php?d=458398 |
generic_textual | HIGH | https://moodle.org/mod/forum/discuss.php?d=458398 |
ssvc | Track | https://moodle.org/mod/forum/discuss.php?d=458398 |
cvssv3.1 | 7.5 | https://nvd.nist.gov/vuln/detail/CVE-2024-34009 |
generic_textual | HIGH | https://nvd.nist.gov/vuln/detail/CVE-2024-34009 |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.47294 |
EPSS Score | 0.0024 |
Published At | June 30, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-01T12:11:29.203511+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-gwf6-q6c2-94p3/GHSA-gwf6-q6c2-94p3.json | 36.1.3 |