CVE-2016-2153:
Moodle Reflected XSS in mod_data advanced search
6.1
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/13/2022
Updated
1/26/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | >= 2.7, < 2.7.13 | 2.7.13 |
moodle/moodle | composer | >= 2.8, < 2.8.11 | 2.8.11 |
moodle/moodle | composer | >= 2.9, < 2.9.5 | 2.9.5 |
moodle/moodle | composer | >= 3.0, < 3.0.3 | 3.0.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped output of user-controlled parameters in search form fields. The GitHub patch shows critical additions of Moodle's s() escaping function to value attributes in multiple field classes' display_search_field methods and author name inputs in lib.php. These functions received user input via URL parameters (f_* fields and u_fn/u_ln) and rendered them without proper HTML entity encoding, enabling XSS injection. The consistent pattern of adding s() in the fix confirms these were the vulnerable points.