CVE-2012-6112:
PHP Spellchecker addon for TinyMCE allows attackers to trigger arbitrary outbound HTTP requests
5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.68482%
CWE
-
Published
5/13/2022
Updated
1/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:N/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | >= 2.1.0, < 2.1.10 | 2.1.10 |
moodle/moodle | composer | >= 2.2.0, < 2.2.7 | 2.2.7 |
moodle/moodle | composer | >= 2.3.0, < 2.3.4 | 2.3.4 |
moodle/moodle | composer | = 2.4.0 | 2.4.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient input sanitization in the GoogleSpell::_getMatches
method. The fix in commit 2291018 (mirrored in Moodle's patches) adds two critical sanitization steps: 1) $lang
is filtered to only allow a-z and hyphens, 2) $str
has control characters removed. Before this fix, attackers could exploit these parameters to inject malicious payloads (e.g., via CR/LF characters) into the HTTP
request, enabling arbitrary outbound requests. The direct correlation between the vulnerability description, CWE-264
(access control), and the code changes confirms this function's role.