CVE-2015-3274: Moodle cross-site scripting (XSS) vulnerability
6.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.48854%
CWE
Published
5/13/2022
Updated
1/26/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | >= 2.7.0, < 2.7.9 | 2.7.9 |
moodle/moodle | composer | >= 2.8.0, < 2.8.7 | 2.8.7 |
moodle/moodle | composer | >= 2.9.0, < 2.9.1 | 2.9.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from user_get_user_details() in user/lib.php handling custom profile fields. The commit diff shows the patched version added conditional use of display_data() (which includes formatting/escaping) instead of raw 'data' property for text/textareas. The CVE description explicitly mentions the absence of external_format_text call in web services as the root cause, which corresponds to this function's pre-patch behavior of using unescaped $formfield->data.