VYPR
Low severityNVD Advisory· Published Nov 24, 2014· Updated May 6, 2026

CVE-2014-7830

CVE-2014-7830

Description

Cross-site scripting (XSS) vulnerability in mod/feedback/mapcourse.php in the Feedback module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the mod/feedback:mapcourse capability to provide a searchcourse parameter.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
moodle/moodlePackagist
< 2.5.92.5.9
moodle/moodlePackagist
>= 2.6.0, < 2.6.62.6.6
moodle/moodlePackagist
>= 2.7.0, < 2.7.32.7.3

Affected products

19
  • Moodle/Moodle19 versions
    cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*+ 18 more
    • cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*range: <=2.4.11
    • cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*
    • cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*

Patches

4
7bb6b84cfd30

MDL-47865 mod_feedback - XSS through $searchstring in mod/feedback/mapcourse.php

https://github.com/moodle/moodleAndreas GrabsOct 26, 2014via ghsa
1 file changed · +2 2
  • mod/feedback/mapcourse.php+2 2 modified
    @@ -111,11 +111,11 @@
                     'value="'.get_string('searchagain').'" '.
                     'onclick="document.location=\'mapcourse.php?id='.$id.'\'"/>';
     
    -    echo '<input type="hidden" name="searchcourse" value="'.$searchcourse.'"/>';
    +    echo '<input type="hidden" name="searchcourse" value="'.s($searchcourse).'"/>';
         echo '<input type="hidden" name="feedbackid" value="'.$feedback->id.'"/>';
         echo $OUTPUT->help_icon('searchcourses', 'feedback');
     } else {
    -    echo '<input type="text" name="searchcourse" value="'.$searchcourse.'"/> ';
    +    echo '<input type="text" name="searchcourse" value="'.s($searchcourse).'"/> ';
         echo '<input type="submit" value="'.get_string('searchcourses').'"/>';
         echo $OUTPUT->help_icon('searchcourses', 'feedback');
     }
    
8bf49b737743

MDL-47865 mod_feedback - XSS through $searchstring in mod/feedback/mapcourse.php

https://github.com/moodle/moodleAndreas GrabsOct 26, 2014via ghsa
1 file changed · +2 2
  • mod/feedback/mapcourse.php+2 2 modified
    @@ -112,11 +112,11 @@
                     'value="'.get_string('searchagain').'" '.
                     'onclick="document.location=\'mapcourse.php?id='.$id.'\'"/>';
     
    -    echo '<input type="hidden" name="searchcourse" value="'.$searchcourse.'"/>';
    +    echo '<input type="hidden" name="searchcourse" value="'.s($searchcourse).'"/>';
         echo '<input type="hidden" name="feedbackid" value="'.$feedback->id.'"/>';
         echo $OUTPUT->help_icon('searchcourses', 'feedback');
     } else {
    -    echo '<input type="text" name="searchcourse" value="'.$searchcourse.'"/> ';
    +    echo '<input type="text" name="searchcourse" value="'.s($searchcourse).'"/> ';
         echo '<input type="submit" value="'.get_string('searchcourses').'"/>';
         echo $OUTPUT->help_icon('searchcourses', 'feedback');
     }
    
b7f75a9c05c6

MDL-47865 mod_feedback - XSS through $searchstring in mod/feedback/mapcourse.php

https://github.com/moodle/moodleAndreas GrabsOct 26, 2014via ghsa
1 file changed · +2 2
  • mod/feedback/mapcourse.php+2 2 modified
    @@ -112,11 +112,11 @@
                     'value="'.get_string('searchagain').'" '.
                     'onclick="document.location=\'mapcourse.php?id='.$id.'\'"/>';
     
    -    echo '<input type="hidden" name="searchcourse" value="'.$searchcourse.'"/>';
    +    echo '<input type="hidden" name="searchcourse" value="'.s($searchcourse).'"/>';
         echo '<input type="hidden" name="feedbackid" value="'.$feedback->id.'"/>';
         echo $OUTPUT->help_icon('searchcourses', 'feedback');
     } else {
    -    echo '<input type="text" name="searchcourse" value="'.$searchcourse.'"/> ';
    +    echo '<input type="text" name="searchcourse" value="'.s($searchcourse).'"/> ';
         echo '<input type="submit" value="'.get_string('searchcourses').'"/>';
         echo $OUTPUT->help_icon('searchcourses', 'feedback');
     }
    
c6b6e5decee4

MDL-47865 mod_feedback - XSS through $searchstring in mod/feedback/mapcourse.php

https://github.com/moodle/moodleAndreas GrabsOct 26, 2014via ghsa
1 file changed · +2 2
  • mod/feedback/mapcourse.php+2 2 modified
    @@ -112,11 +112,11 @@
                     'value="'.get_string('searchagain').'" '.
                     'onclick="document.location=\'mapcourse.php?id='.$id.'\'"/>';
     
    -    echo '<input type="hidden" name="searchcourse" value="'.$searchcourse.'"/>';
    +    echo '<input type="hidden" name="searchcourse" value="'.s($searchcourse).'"/>';
         echo '<input type="hidden" name="feedbackid" value="'.$feedback->id.'"/>';
         echo $OUTPUT->help_icon('searchcourses', 'feedback');
     } else {
    -    echo '<input type="text" name="searchcourse" value="'.$searchcourse.'"/> ';
    +    echo '<input type="text" name="searchcourse" value="'.s($searchcourse).'"/> ';
         echo '<input type="submit" value="'.get_string('searchcourses').'"/>';
         echo $OUTPUT->help_icon('searchcourses', 'feedback');
     }
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

11

News mentions

0

No linked articles in our index yet.