CVE-2014-2571: Moodle cross-site scripting (XSS) vulnerability
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.43374%
CWE
Published
5/13/2022
Updated
1/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | < 2.4.9 | 2.4.9 |
moodle/moodle | composer | >= 2.5.0, < 2.5.5 | 2.5.5 |
moodle/moodle | composer | >= 2.6.0, < 2.6.2 | 2.6.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the unescaped output of $questiontext
in the quiz_question_tostring
function. The GitHub patch explicitly adds the s()
sanitization function to neutralize HTML/script content, confirming the lack of proper escaping in the original code. The test case in editlib_test.php
further validates the XSS scenario by checking sanitized output. The direct correlation between the vulnerability description, CWE-79 classification, and the code change provides high confidence in this assessment.