This is the entire text of the report:
Session Token in URL.
There are 2 instances of this issue:
/mymoodle.com/calendar/export.php
/mymoodle.com/calendar/export.php
Issue background
Sensitive information within URLs may be logged in various locations, including the user's browser, the web
server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.
Issue remediation
Applications should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.
Vulnerability classifications
CWE-200: Information Exposure
CWE-384: Session Fixation
CWE-598: Information Exposure Through Query Strings in GET Request