-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| moodle/moodle | composer | >= 3.9, < 3.9.10 | 3.9.10 |
| moodle/moodle | composer | >= 3.10, < 3.10.7 | 3.10.7 |
| moodle/moodle | composer | >= 3.11, < 3.11.3 | 3.11.3 |
The vulnerability stems from improper escaping in LaTeX preamble handling. The primary suspect is the TeX filter's document generation (filter_tex_process), which would directly incorporate the unescaped preamble. The admin setting's write function (admin_setting_configtextarea) is a secondary candidate, as it might fail to sanitize input before storage. While exact patch details aren't available, these components align with the described attack vector where admin-controlled LaTeX preamble enables file read operations via HTTP server context.
Ongoing coverage of React2Shell