CVE-2013-7341: Moodle cross-site scripting (XSS) vulnerabilities
4.3
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.49119%
CWE
Published
5/13/2022
Updated
2/7/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:M/Au:N/C:N/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | < 2.4.9 | 2.4.9 |
moodle/moodle | composer | >= 2.5.0, < 2.5.5 | 2.5.5 |
moodle/moodle | composer | >= 2.6.0, < 2.6.2 | 2.6.2 |
typo3/cms | composer | >= 6.2.0, < 6.2.14 | 6.2.14 |
typo3/cms | composer | >= 7.0.0, < 7.3.1 | 7.3.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly cites two attack vectors: (1) crafted playerId and (2) external domain references. The commit diff shows Flowplayer was upgraded to 3.2.17
which added same-domain checks for plugins/configs
(visible in README.txt
changes). The JavaScript files (flowplayer-3.2.13.js
) contain code modifications enforcing domain validation. The removal of flowplayer-3.2.12.min.js
and addition of patched versions indicates the vulnerable code resided in Flowplayer's resource loading logic, specifically in functions
handling plugin initialization and external domain references.