First published: Tue Jul 12 2022(Updated: )
A minor reflected XSS risk was identified in the LTI module. This did not impact authenticated users. Versions affected: 4.0 to 4.0.1, 3.11 to 3.11.7, 3.9 to 3.9.14 and earlier unsupported versions Versions fixed: 4.0.2, 3.11.8 and 3.9.15
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle Moodle | >=3.9.0<3.9.15 | |
Moodle Moodle | >=3.11.0<3.11.8 | |
Moodle Moodle | =4.0.0 | |
Moodle Moodle | =4.0.0-beta | |
Moodle Moodle | =4.0.0-rc1 | |
Moodle Moodle | =4.0.0-rc2 | |
Moodle Moodle | =4.0.0-rc3 | |
Moodle Moodle | =4.0.0-rc4 | |
Moodle Moodle | =4.0.1 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Redhat Enterprise Linux | =8.0 | |
composer/moodle/moodle | >=3.9<3.9.15 | 3.9.15 |
composer/moodle/moodle | >=3.11<3.11.8 | 3.11.8 |
composer/moodle/moodle | >=4.0<4.0.2 | 4.0.2 |
redhat/moodle | <4.0.2 | 4.0.2 |
redhat/moodle | <3.11.8 | 3.11.8 |
redhat/moodle | <3.9.15 | 3.9.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Moodle LTI module XSS issue is CVE-2022-35653.
The severity of CVE-2022-35653 is medium.
The vulnerability CVE-2022-35653 occurs due to insufficient sanitization of user-supplied data in the LTI module of Moodle.
The impact of CVE-2022-35653 is that a remote attacker can trick the victim to execute arbitrary HTML and script code in the user's browser.
To fix the vulnerability CVE-2022-35653, update Moodle to version 3.9.15, 3.11.8, or 4.0.2.