Vulnerability from bitnami_vulndb
Published
2026-02-12 08:51
Modified
2026-02-12 09:10
Summary
Moodle: moodle: cross-site scripting (xss) via improper sanitization of ai prompt responses
Details
A flaw was found in Moodle. This cross-site scripting (XSS) vulnerability, caused by improper sanitization of AI prompt responses, allows attackers to inject malicious HTML or script into web pages. When other users view these compromised pages, their sessions could be stolen, or the user interface could be manipulated.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "moodle",
"purl": "pkg:bitnami/moodle"
},
"ranges": [
{
"events": [
{
"introduced": "4.5.0"
},
{
"fixed": "4.5.8"
},
{
"introduced": "5.0.0"
},
{
"fixed": "5.0.4"
},
{
"introduced": "5.1.0"
},
{
"fixed": "5.1.1"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2025-67849"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
],
"severity": "Medium"
},
"details": "A flaw was found in Moodle. This cross-site scripting (XSS) vulnerability, caused by improper sanitization of AI prompt responses, allows attackers to inject malicious HTML or script into web pages. When other users view these compromised pages, their sessions could be stolen, or the user interface could be manipulated.",
"id": "BIT-moodle-2025-67849",
"modified": "2026-02-12T09:10:24.600Z",
"published": "2026-02-12T08:51:02.532Z",
"references": [
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-67849"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423835"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67849"
}
],
"schema_version": "1.6.2",
"summary": "Moodle: moodle: cross-site scripting (xss) via improper sanitization of ai prompt responses"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…