Low severityNVD Advisory· Published Nov 24, 2014· Updated May 6, 2026
CVE-2014-7835
CVE-2014-7835
Description
webservice/upload.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 does not ensure that a file upload is for a private or draft area, which allows remote authenticated users to upload files containing JavaScript, and consequently conduct cross-site scripting (XSS) attacks, by specifying the profile-picture area.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
moodle/moodlePackagist | >= 2.6.0, < 2.6.6 | 2.6.6 |
moodle/moodlePackagist | >= 2.7.0, < 2.7.3 | 2.7.3 |
Affected products
19cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*+ 18 more
- cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*range: <=2.4.11
- cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*
Patches
32f87351d5480MDL-47868 ws: verify upload areas
1 file changed · +5 −0
webservice/upload.php+5 −0 modified@@ -68,6 +68,11 @@ $context = context_user::instance($USER->id); require_capability('moodle/user:manageownfiles', $context); +if ($filearea !== 'private' and $filearea !== 'draft') { + // Do not dare to allow more areas here! + throw new file_exception('error'); +} + $fs = get_file_storage(); $totalsize = 0;
ea1fbc002855MDL-47868 ws: verify upload areas
1 file changed · +5 −0
webservice/upload.php+5 −0 modified@@ -68,6 +68,11 @@ $context = context_user::instance($USER->id); require_capability('moodle/user:manageownfiles', $context); +if ($filearea !== 'private' and $filearea !== 'draft') { + // Do not dare to allow more areas here! + throw new file_exception('error'); +} + $fs = get_file_storage(); $totalsize = 0;
76ae1f6068f6MDL-47868 ws: verify upload areas
1 file changed · +5 −0
webservice/upload.php+5 −0 modified@@ -68,6 +68,11 @@ $context = context_user::instance($USER->id); require_capability('moodle/user:manageownfiles', $context); +if ($filearea !== 'private' and $filearea !== 'draft') { + // Do not dare to allow more areas here! + throw new file_exception('error'); +} + $fs = get_file_storage(); $totalsize = 0;
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- github.com/advisories/GHSA-vrf6-q7qj-69v5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2014-7835ghsaADVISORY
- openwall.com/lists/oss-security/2014/11/17/11nvdWEB
- github.com/moodle/moodle/commit/2f87351d5480f562d6811cdf3bea032612e0325eghsaWEB
- github.com/moodle/moodle/commit/76ae1f6068f63149acc2d8c362af94067f4a227dghsaWEB
- github.com/moodle/moodle/commit/ea1fbc00285514242d620ea017e187eb139deedbghsaWEB
- moodle.org/mod/forum/discuss.phpnvdWEB
- web.archive.org/web/20150914064838/http://www.securitytracker.com/id/1031215ghsaWEB
- www.securitytracker.com/id/1031215nvd
News mentions
0No linked articles in our index yet.