Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. moodle/moodle
  4. ›
  5. CVE-2019-6970

CVE-2019-6970: Moodle SSRF Vulnerability

May 14, 2022 (updated May 30, 2025)

The edit_blog.php script allows a registered user to add external RSS feed resources. It was identified that this feature could be abused to be used as a SSRF attack vector by adding a malicious URL/TCP PORT in order to target internal network or an internet hosted server, bypassing firewall rules, IP filtering and more.

This kind of vulnerability is then called “blind” because of no response available on Moodle web site, enforcing attacker to exploit it using a “time based” approach.

References

  • cds.thalesgroup.com/en/tcs-cert/CVE-2019-6970
  • excellium-services.com/cert-xlm-advisory/cve-2019-6970
  • github.com/advisories/GHSA-vjxx-54vw-q59f
  • github.com/moodle/moodle
  • nvd.nist.gov/vuln/detail/CVE-2019-6970
  • www.excellium-services.com/cert-xlm-advisory
  • www.excellium-services.com/cert-xlm-advisory/cve-2019-6970

Code Behaviors & Features

Detect and mitigate CVE-2019-6970 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.5.0 before 3.5.4

Fixed versions

  • 3.5.4

Solution

Upgrade to version 3.5.4 or above.

Impact 7.5 HIGH

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

packagist/moodle/moodle/CVE-2019-6970.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 15 Dec 2025 00:19:36 +0000.