VYPR
Moderate severityNVD Advisory· Published Jul 25, 2022· Updated Aug 3, 2024

CVE-2022-35653

CVE-2022-35653

Description

A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2022-35653 is a reflected XSS in Moodle's LTI module due to improper input sanitization, allowing unauthenticated remote code execution in a victim's browser.

Vulnerability

Description

CVE-2022-35653 is a reflected cross-site scripting (XSS) vulnerability found in the LTI (Learning Tools Interoperability) module of Moodle, the open-source learning platform. The root cause is insufficient sanitization of user-supplied data within this module, allowing an attacker to inject arbitrary HTML and JavaScript code via a crafted URL [1].

Attack

Vector and Prerequisites

The vulnerability is reflected, meaning the malicious payload is embedded in a URL and executed only when the victim clicks the specially crafted link. No authentication is required to trigger the flaw, as the issue lies in pre-authentication handling of input [1]. The attacker does not need special network access beyond being able to deliver the link, which could be done through email, forums, or other mediums. The vulnerability does not impact authenticated users, meaning that once a user logs in, the vulnerable code path is no longer reachable [1].

Impact

Successful exploitation allows the attacker to execute arbitrary script code in the victim's browser within the context of the Moodle site. This can lead to theft of sensitive information (e.g., session tokens, cookies), alteration of page content, phishing attacks (by presenting fake login forms), and drive-by downloads of malware [1].

Mitigation

Status

The issue was addressed in Moodle by the patch referenced in commit MDL-72299 [1]. Administrators are advised to update to the latest Moodle version that includes this fix. Fedora package announcements [3][4] also reference the advisory, confirming that updates are available. No evidence of in-the-wild exploitation or inclusion in CISA's Known Exploited Vulnerabilities (KEV) catalog was found in the provided references.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
moodle/moodlePackagist
>= 4.0, < 4.0.24.0.2
moodle/moodlePackagist
>= 3.11, < 3.11.83.11.8
moodle/moodlePackagist
>= 3.9, < 3.9.153.9.15

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.