CVE-2019-6970 – moodle/moodle
Package
Manager: composer
Name: moodle/moodle
Vulnerable Version: >=3.5.0 <3.5.4
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00367 pctl0.57876
Details
Moodle SSRF Vulnerability The `edit_blog.php` script allows a registered user to add external RSS feed resources. It was identified that this feature could be abused to be used as a SSRF attack vector by adding a malicious URL/TCP PORT in order to target internal network or an internet hosted server, bypassing firewall rules, IP filtering and more. This kind of vulnerability is then called “blind” because of no response available on Moodle web site, enforcing attacker to exploit it using a “time based” approach.
Metadata
Created: 2022-05-14T01:17:52Z
Modified: 2025-05-30T19:54:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vjxx-54vw-q59f/GHSA-vjxx-54vw-q59f.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-vjxx-54vw-q59f
Finding: F100
Auto approve: 1