-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| moodle/moodle | composer | >= 4.3.0, < 4.3.3 | 4.3.3 |
| moodle/moodle | composer | >= 4.2.0, < 4.2.6 | 4.2.6 |
| moodle/moodle | composer | < 4.1.9 | 4.1.9 |
The vulnerability stemmed from using $FULLME in set_url() which accepts all URL parameters. The commit 6eaeeda explicitly shows the replacement with a controlled parameter list, indicating the previous implementation lacked parameter validation/limiting. The file mod/forum/search.php was modified to implement this restriction, making the unpatched set_url($FULLME) call the vulnerable component.
A Semantic Attack on Google Gemini - Read the Latest Research