{"id":"UBUNTU-CVE-2023-23922","details":"The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in blog search. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.","modified":"2025-10-24T05:01:48Z","published":"2023-02-17T20:15:00Z","upstream":["CVE-2023-23922"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-23922"},{"type":"REPORT","url":"https://moodle.org/mod/forum/discuss.php?d=443273#p1782022"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2023-23922"}],"affected":[{"package":{"name":"moodle","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/moodle@3.0.3+dfsg-0ubuntu1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.7.9+dfsg-1","2.7.10+dfsg-1","2.7.11+dfsg-1","2.7.11+dfsg-2","2.7.12+dfsg-1","3.0.3+dfsg-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"moodle","binary_version":"3.0.3+dfsg-0ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-23922.json"}},{"package":{"name":"moodle","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/moodle@3.0.3+dfsg-0ubuntu1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.0.3+dfsg-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"moodle","binary_version":"3.0.3+dfsg-0ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-23922.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}