{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T11:15:34.662","vulnerabilities":[{"cve":{"id":"CVE-2022-35651","sourceIdentifier":"patrick@puiterwijk.org","published":"2022-07-25T16:15:08.407","lastModified":"2024-11-21T07:11:26.320","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks."},{"lang":"es","value":"Se encontró una vulnerabilidad de tipo XSS almacenado y SSRF ciego en Moodle, es producido debido a un saneamiento insuficiente de los datos suministrados por el usuario en los detalles de la pista SCORM. Un atacante remoto puede engañar a la víctima para que siga un enlace especialmente diseñado y ejecutar código HTML y script arbitrario en el navegador del usuario en el contexto del sitio web vulnerable para robar información potencialmente confidencial, cambiar la apariencia de la página web, puede llevar a cabo ataques de phishing y drive-by-download"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}]},"weaknesses":[{"source":"patrick@puiterwijk.org","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*","versionStartIncluding":"3.9.0","versionEndExcluding":"3.9.15","matchCriteriaId":"6B77A5BD-2E62-402E-91AE-123454C5C5C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11.0","versionEndExcluding":"3.11.8","matchCriteriaId":"EED9C096-FAE5-4206-B901-1D2EDD67AE7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:4.0.0:-:*:*:*:*:*:*","matchCriteriaId":"6C077F6B-BA29-4B33-BD6B-AB4BEC630C47"},{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:4.0.0:beta:*:*:*:*:*:*","matchCriteriaId":"E3788731-D2EA-47BA-82C0-67E046AC6EF7"},{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:4.0.0:rc1:*:*:*:*:*:*","matchCriteriaId":"D46F561A-115D-4778-9565-FDAE3E36E5D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:4.0.0:rc2:*:*:*:*:*:*","matchCriteriaId":"E1E3A617-1A85-4CD9-AABD-0705B8CEBBDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:4.0.0:rc3:*:*:*:*:*:*","matchCriteriaId":"E81FE226-7833-4D1B-BB67-A3D2D09E9BE5"},{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:4.0.0:rc4:*:*:*:*:*:*","matchCriteriaId":"DC631535-FA72-4293-AC5C-56B3D1AFB1A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:moodle:moodle:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"63597916-DD15-4E78-8C27-2CE6F1A5A76C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*","matchCriteriaId":"053C1B35-3869-41C2-9551-044182DE0A64"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","matchCriteriaId":"80E516C0-98A4-4ADE-B69F-66A772E2BAAA"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","matchCriteriaId":"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"}]}]}],"references":[{"url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71921","source":"patrick@puiterwijk.org","tags":["Patch","Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106275","source":"patrick@puiterwijk.org","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/","source":"patrick@puiterwijk.org"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/","source":"patrick@puiterwijk.org"},{"url":"https://moodle.org/mod/forum/discuss.php?d=436458","source":"patrick@puiterwijk.org","tags":["Vendor Advisory"]},{"url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71921","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106275","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://moodle.org/mod/forum/discuss.php?d=436458","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}