-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| moodle/moodle | composer | >= 4.0.0-beta, < 4.0.6 | 4.0.6 |
| moodle/moodle | composer | >= 4.1.0-beta, < 4.1.1 | 4.1.1 |
The vulnerability exists in blog search functionality where user input isn't properly sanitized. While exact commit details are unavailable, Moodle's architecture suggests: 1) search.php handles parameter processing 2) output classes manage rendering. The medium confidence reflects lack of direct code evidence, but aligns with: - Vulnerability description specifying blog search vector - XSS pattern requiring unescaped output of URL parameters - Moodle's typical blog component structure - Security patch version ranges indicating frontend fixes