CVE-2022-40315:
Moodle Minor SQL injection risk in admin user browsing
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.60913%
CWE
Published
10/1/2022
Updated
4/23/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | >= 3.9, < 3.9.17 | 3.9.17 |
moodle/moodle | composer | >= 3.11, < 3.11.10 | 3.11.10 |
moodle/moodle | composer | >= 4.0, < 4.0.4 | 4.0.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability exists in the admin user browsing interface, which typically involves querying the database for user records. Moodle's user management functions (like get_users
) often handle filter parameters from admin inputs. Given the SQL injection CWE-89 pattern and the context of user listing with filters, the most probable vulnerable function is the SQL query builder in the admin user management code that processes unsanitized inputs. The 'limited' risk suggests it requires admin privileges but uses direct input interpolation in SQL strings.