-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| moodle/moodle | composer | = 4.2.0 | 4.2.1 |
| moodle/moodle | composer | >= 4.1.0, < 4.1.4 | 4.1.4 |
| moodle/moodle | composer | >= 4.0.0, < 4.0.9 | 4.0.9 |
| moodle/moodle | composer | < 3.11.15 | 3.11.15 |
The vulnerability stems from insufficient sanitization on the groups page, specifically in rendering user-controlled content. Moodle's group management typically uses renderer classes (e.g., in group/classes/output/) to generate HTML. The advisory explicitly mentions the groups page, and XSS vulnerabilities in Moodle often occur in renderer methods that output unescaped data. The lack of commit details prevents absolute certainty, but the structured naming convention (renderer.php + groups_table) aligns with Moodle's architecture and the described flaw. The confidence is high because the pattern matches Moodle's XSS mitigation practices (e.g., missing format_string() or s() calls).
Ongoing coverage of React2Shell