VYPR
Low severityNVD Advisory· Published Jul 29, 2014· Updated May 6, 2026

CVE-2014-3544

CVE-2014-3544

Description

Cross-site scripting (XSS) vulnerability in user/profile.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote authenticated users to inject arbitrary web script or HTML via the Skype ID profile field.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
moodle/moodlePackagist
< 2.4.112.4.11
moodle/moodlePackagist
>= 2.5.0, < 2.5.72.5.7
moodle/moodlePackagist
>= 2.6.0, < 2.6.42.6.4
moodle/moodlePackagist
>= 2.7.0, < 2.7.12.7.1

Affected products

35
  • Moodle/Moodle35 versions
    cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*+ 34 more
    • cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*range: <=2.3.11
    • cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.6:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*

Patches

4
0207466e778b

MDL-45683 user: Escaping Skype ID used in profile

https://github.com/moodle/moodleOsanda Malith JayathissaJun 4, 2014via ghsa
1 file changed · +1 1
  • user/profile.php+1 1 modified
    @@ -334,7 +334,7 @@
     
     if ($user->skype && !isset($hiddenfields['skypeid'])) {
         $imurl = 'skype:'.urlencode($user->skype).'?call';
    -    $iconurl = new moodle_url('http://mystatus.skype.com/smallicon/'.$user->skype);
    +    $iconurl = new moodle_url('http://mystatus.skype.com/smallicon/'.urlencode($user->skype));
         if (strpos($CFG->httpswwwroot, 'https:') === 0) {
             // Bad luck, skype devs are lazy to set up SSL on their servers - see MDL-37233.
             $statusicon = '';
    
f7b6562f20f6

MDL-45683 user: Escaping Skype ID used in profile

https://github.com/moodle/moodleOsanda Malith JayathissaJun 4, 2014via ghsa
1 file changed · +1 1
  • user/profile.php+1 1 modified
    @@ -314,7 +314,7 @@
     
     if ($user->skype && !isset($hiddenfields['skypeid'])) {
         $imurl = 'skype:'.urlencode($user->skype).'?call';
    -    $iconurl = new moodle_url('http://mystatus.skype.com/smallicon/'.$user->skype);
    +    $iconurl = new moodle_url('http://mystatus.skype.com/smallicon/'.urlencode($user->skype));
         if (strpos($CFG->httpswwwroot, 'https:') === 0) {
             // Bad luck, skype devs are lazy to set up SSL on their servers - see MDL-37233.
             $statusicon = '';
    
ce5a785b0962

MDL-45683 user: Escaping Skype ID used in profile

https://github.com/moodle/moodleOsanda Malith JayathissaJun 4, 2014via ghsa
1 file changed · +1 1
  • user/profile.php+1 1 modified
    @@ -334,7 +334,7 @@
     
     if ($user->skype && !isset($hiddenfields['skypeid'])) {
         $imurl = 'skype:'.urlencode($user->skype).'?call';
    -    $iconurl = new moodle_url('http://mystatus.skype.com/smallicon/'.$user->skype);
    +    $iconurl = new moodle_url('http://mystatus.skype.com/smallicon/'.urlencode($user->skype));
         if (strpos($CFG->httpswwwroot, 'https:') === 0) {
             // Bad luck, skype devs are lazy to set up SSL on their servers - see MDL-37233.
             $statusicon = '';
    
739d227c5888

MDL-45683 user: Escaping Skype ID used in profile

https://github.com/moodle/moodleOsanda Malith JayathissaJun 4, 2014via ghsa
1 file changed · +1 1
  • user/profile.php+1 1 modified
    @@ -324,7 +324,7 @@
     
     if ($user->skype && !isset($hiddenfields['skypeid'])) {
         $imurl = 'skype:'.urlencode($user->skype).'?call';
    -    $iconurl = new moodle_url('http://mystatus.skype.com/smallicon/'.$user->skype);
    +    $iconurl = new moodle_url('http://mystatus.skype.com/smallicon/'.urlencode($user->skype));
         if (strpos($CFG->httpswwwroot, 'https:') === 0) {
             // Bad luck, skype devs are lazy to set up SSL on their servers - see MDL-37233.
             $statusicon = '';
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

14

News mentions

0

No linked articles in our index yet.