Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7466 | A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks. |
Github GHSA |
GHSA-xqcf-vgqc-pcmg | Moodle blind Server-Side Request Forgery (SSRF) vulnerability in LTI provider library |
Tue, 29 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2025-04-29T14:22:36.364Z
Reserved: 2022-11-11T00:00:00.000Z
Link: CVE-2022-45152
Updated: 2024-08-03T14:09:56.453Z
Status : Modified
Published: 2022-11-25T19:15:12.107
Modified: 2025-04-29T15:15:52.930
Link: CVE-2022-45152
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA