CVE-2022-35649: Moodle PostScript Code Injection
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.88571%
CWE
Published
7/26/2022
Updated
4/23/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| moodle/moodle | composer | >= 3.9, < 3.9.15 | 3.9.15 |
| moodle/moodle | composer | >= 3.11, < 3.11.8 | 3.11.8 |
| moodle/moodle | composer | >= 4.0, < 4.0.2 | 4.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper GhostScript parameterization during PostScript processing. While exact commit diffs aren't available, Moodle's security bulletin references MDL-75044 which typically indicates internal tracking numbers. The pattern matches known GhostScript vulnerabilities where missing -dSAFER enables code execution. The file path aligns with Moodle's architecture for document conversion handling, and the severity/description implies direct command line construction vulnerability.