CVE-2019-18210: Moodle Persistent Cross-site Scripting (XSS)
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.62251%
CWE
Published
5/24/2022
Updated
5/3/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| moodle/moodle | composer | >= 3.7, <= 3.7.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient input sanitization in the module editing workflow. While client-side filtering exists via TinyMCE editor, the server-side processing in modedit.php's update_moduleinfo function accepts raw HTML input from introeditor[text] parameter and stores it without proper neutralization. This allows authenticated teachers to persist arbitrary JavaScript that executes when other users view the course module. The file path and function are explicitly tied to the vulnerable endpoint described in CVE/GHSA documentation, and the attack vector matches the described parameter injection pattern.