Description
Cross-site scripting (XSS) vulnerability in blog/edit.php in Moodle 1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to inject arbitrary web script or HTML via the etitle parameter (blog entry title).
Exploits (1)
References (10)
Core 10
Core References
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00001.html
Exploit x_refsource_misc
http://www.procheckup.com/Vulnerability_PR08-13.php
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31196
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/30348
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/6653
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/494656/100/0/threaded
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2008/dsa-1691
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43961
Various Sources x_refsource_confirm
http://moodle.org/mod/forum/discuss.php?d=101401
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31339
Scores
EPSS
0.0055
EPSS Percentile
68.0%
Details
CWE
CWE-79
Status
published
Products (11)
moodle/moodle
1.6.0
moodle/moodle
1.6.1
moodle/moodle
1.6.2
moodle/moodle
1.6.3
moodle/moodle
1.6.4
moodle/moodle
1.6.5
moodle/moodle
1.6.6
moodle/moodle
1.7.1
moodle/moodle
1.7.2
moodle/moodle
1.7.3
... and 1 more
Published
Jul 25, 2008
Tracked Since
Feb 18, 2026