CVE-2019-18210
PHP vulnerability analysis and mitigation

Overview

Persistent XSS vulnerability (CVE-2019-18210) affects Moodle through version 3.7.2, allowing authenticated users with Teacher role or above to inject JavaScript into the session of other users (enrolled students or site administrators) via the introeditor[text] parameter in /course/modedit.php. The vulnerability was discovered in 2019 and disclosed by February 2020 (NVD, Gist Advisory).

Technical details

The vulnerability exists in the course editing functionality (/course/modedit.php) where teachers can add HTML-based descriptions to course objects. While there is a client-side sanitizer, it can be bypassed by intercepting the HTTP request and injecting JavaScript code via the introeditor[text] parameter. The injected JavaScript executes on page load for any user accessing the page. The vulnerability has a CVSS v3.1 Base Score of 5.4 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N (NVD).

Impact

The vulnerability could be exploited to perform targeted denial of service attacks, deploy ransomware, inject malicious scripts, collect user information, and enable social engineering attacks. Attackers could potentially lock students out of unit pages, force ransom payments for access to class content (particularly critical before exams), trick users into revealing passwords, or steal information from the class homepage (Gist Advisory).

Mitigation and workarounds

There is a disagreement between the discoverer and vendor regarding this vulnerability. Moodle's position is that teachers are intentionally trusted with the ability to add arbitrary JavaScript, though this capability was not documented on Moodle's Teacher_role page at the time. The vendor has classified this as a false positive rather than a bug (NVD, Teacher Role).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21857HIGH8.3
  • PHPPHP
  • redaxo/source
NoYesJan 07, 2026
CVE-2025-61676MEDIUM6.1
  • PHPPHP
  • october/system
NoYesJan 10, 2026
CVE-2025-61674MEDIUM6.1
  • PHPPHP
  • october/system
NoYesJan 10, 2026
CVE-2026-21896MEDIUM5.8
  • PHPPHP
  • getkirby/cms
NoYesJan 08, 2026
CVE-2026-22242MEDIUM4.9
  • PHPPHP
  • coreshop/core-shop
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management