{"id":"CVE-2016-2152","details":"Multiple cross-site scripting (XSS) vulnerabilities in auth/db/auth.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 allow remote attackers to inject arbitrary web script or HTML via an external DB profile field.","aliases":["GHSA-6mxm-wpqv-675h"],"modified":"2026-03-14T09:20:53.142162Z","published":"2016-05-22T20:59:01.097Z","related":["MGASA-2016-0122"],"references":[{"type":"WEB","url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50705"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/03/21/1"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035333"},{"type":"ADVISORY","url":"https://moodle.org/mod/forum/discuss.php?d=330174"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/moodle/moodle","events":[{"introduced":"0"},{"last_affected":"ff579d28be06ed33140d8cbf511863af9005bf71"},{"introduced":"0"},{"last_affected":"c1ed2546431985262aefc4a39f9dec43e12426d3"},{"introduced":"0"},{"last_affected":"8b3d19c2f52bcfc6b5df4cdd376948d4fac975fa"},{"introduced":"0"},{"last_affected":"31059fd6534655d0eb55a5a455f7b885ec53e0e2"},{"introduced":"0"},{"last_affected":"803ddf9af38c632eb58d1c7ea4b2611e873e6325"},{"introduced":"0"},{"last_affected":"6926971a0f203a4f5d3bed9f20ad43451f33690c"},{"introduced":"0"},{"last_affected":"f25f4caffdece4aabb65b3fb2b2864f4318602ec"},{"introduced":"0"},{"last_affected":"8533cba2ae9d000a5e98742d9d66f07d934754aa"},{"introduced":"0"},{"last_affected":"fad0937a8211e761f6f71d9c585bc4390bc1f0b3"},{"introduced":"0"},{"last_affected":"12e29080e14d82441e10bcd91a6067508e5c4dfa"},{"introduced":"0"},{"last_affected":"fa54db9c03de0fca90d717aed5e05814470983ca"},{"introduced":"0"},{"last_affected":"c92478291f347788fe4b932b121356cf535e26c8"},{"introduced":"0"},{"last_affected":"059c03d494fc8407644adaa5625ba2d86955861e"},{"introduced":"0"},{"last_affected":"3f85661e188670bd8c9c2f99bc02676bda2a5cae"},{"introduced":"0"},{"last_affected":"21db825b19e84bb24c0661b551a5069970e143c4"},{"introduced":"0"},{"last_affected":"296b602f2cd751cac5de6bda553db381432da704"},{"introduced":"0"},{"last_affected":"f2c730fecfcc9850ea39cf53186f8b3f0a114ae1"},{"introduced":"0"},{"last_affected":"68b1fd2c5500284e0afe8fda78b2e9551eb697a6"},{"introduced":"0"},{"last_affected":"f4dc567e79e871b7e0aab64dd39706ac112094ac"},{"introduced":"0"},{"last_affected":"be3e6f62029e26a125871d4b6bf42156cb7e512c"},{"introduced":"0"},{"last_affected":"dc7b914677dcdded287671ca9eb92e0e95e9f2a0"},{"introduced":"0"},{"last_affected":"1f2979d0e51c2d2a8dc535b9c84b7364016fe8d4"},{"introduced":"0"},{"last_affected":"e494078a27ae8fd2f91c908d12911adb3c32e6ee"},{"introduced":"0"},{"last_affected":"ae1854f55c265e2e0966de4b81636c31c641b029"},{"introduced":"0"},{"last_affected":"2e8e92b0f1a21a77aadcb320d358273855193cd0"},{"introduced":"0"},{"last_affected":"cbd90c01c120a199ca53b5965785c55f88834cdc"},{"introduced":"0"},{"last_affected":"c948f378b9d7a819d2d430894fa9840cfe9b5590"},{"introduced":"0"},{"last_affected":"b7d2ed3004ba4f165aba55e1a235f02d55f76624"},{"introduced":"0"},{"last_affected":"3a325f777f9d43fda5c1dfb1287a8bf6d8e61938"},{"introduced":"0"},{"last_affected":"d16cdbd81fbf07e33f55c26f0569ee1424126b59"},{"introduced":"0"},{"last_affected":"6114fab93b414fcfa107d5a8fa2b35bc99d3464e"},{"introduced":"0"},{"last_affected":"62e799ac84232c065790c8cab0f841e43ae038e0"},{"introduced":"0"},{"last_affected":"5d35d7b8843f5f4571dd0b10ad1490cd524e67da"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.6.11"},{"introduced":"0"},{"last_affected":"2.7.0"},{"introduced":"0"},{"last_affected":"2.7.1"},{"introduced":"0"},{"last_affected":"2.7.2"},{"introduced":"0"},{"last_affected":"2.7.3"},{"introduced":"0"},{"last_affected":"2.7.4"},{"introduced":"0"},{"last_affected":"2.7.5"},{"introduced":"0"},{"last_affected":"2.7.6"},{"introduced":"0"},{"last_affected":"2.7.7"},{"introduced":"0"},{"last_affected":"2.7.8"},{"introduced":"0"},{"last_affected":"2.7.9"},{"introduced":"0"},{"last_affected":"2.7.10"},{"introduced":"0"},{"last_affected":"2.7.11"},{"introduced":"0"},{"last_affected":"2.7.12"},{"introduced":"0"},{"last_affected":"2.8.0"},{"introduced":"0"},{"last_affected":"2.8.1"},{"introduced":"0"},{"last_affected":"2.8.2"},{"introduced":"0"},{"last_affected":"2.8.3"},{"introduced":"0"},{"last_affected":"2.8.4"},{"introduced":"0"},{"last_affected":"2.8.5"},{"introduced":"0"},{"last_affected":"2.8.6"},{"introduced":"0"},{"last_affected":"2.8.7"},{"introduced":"0"},{"last_affected":"2.8.8"},{"introduced":"0"},{"last_affected":"2.8.9"},{"introduced":"0"},{"last_affected":"2.8.10"},{"introduced":"0"},{"last_affected":"2.9.0"},{"introduced":"0"},{"last_affected":"2.9.1"},{"introduced":"0"},{"last_affected":"2.9.2"},{"introduced":"0"},{"last_affected":"2.9.3"},{"introduced":"0"},{"last_affected":"2.9.4"},{"introduced":"0"},{"last_affected":"3.0.0"},{"introduced":"0"},{"last_affected":"3.0.1"},{"introduced":"0"},{"last_affected":"3.0.2"}]}}],"versions":["v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.0.9","v1.1.0","v1.1.1","v1.2.0","v1.2.1","v1.3.0","v2.0.0","v2.0.0-rc1","v2.0.0-rc2","v2.0.1","v2.0.2","v2.1.0","v2.2.0","v2.2.0-beta","v2.2.0-rc1","v2.3.0","v2.3.0-beta","v2.3.0-rc1","v2.4.0","v2.4.0-beta","v2.4.0-rc1","v2.5.0","v2.5.0-beta","v2.5.0-rc1","v2.6.0","v2.6.0-beta","v2.6.0-rc1","v2.6.1","v2.6.10","v2.6.11","v2.6.2","v2.6.3","v2.6.4","v2.6.5","v2.6.6","v2.6.7","v2.6.8","v2.6.9","v2.7.0","v2.7.0-beta","v2.7.0-rc1","v2.7.0-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2152.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}