{"id":"CVE-2022-35649","details":"The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.","aliases":["BIT-moodle-2022-35649","GHSA-xp2f-9mx3-3c6p"],"modified":"2026-04-10T04:49:04.448738Z","published":"2022-07-25T16:15:08.247Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/"},{"type":"ADVISORY","url":"https://moodle.org/mod/forum/discuss.php?d=436456"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106273"},{"type":"FIX","url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75044"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/moodle/moodle","events":[{"introduced":"500c131eb49771e36f68d151dfa37fef5a9bc2df"},{"fixed":"84d3ae1b081ba764a54baf40ed063b96764c81c4"},{"introduced":"94f2d3fc4b974c5c7d500988c56b7ca15f58d7ec"},{"fixed":"b8fd606243238b9624b12c0fba6c39f74b0c0869"},{"introduced":"8b359ad7a63cf219110bca80552fe3d4ea2a635d"},{"fixed":"d069cb93378d39ee00ce5f30cc520aaee4ae496c"}],"database_specific":{"versions":[{"introduced":"3.9.0"},{"fixed":"3.9.15"},{"introduced":"3.11.0"},{"fixed":"3.11.8"},{"introduced":"4.0.0"},{"fixed":"4.0.2"}]}}],"versions":["v3.11.0","v3.11.1","v3.11.2","v3.11.3","v3.11.4","v3.11.5","v3.11.6","v3.11.7","v3.9.0","v3.9.1","v3.9.10","v3.9.11","v3.9.12","v3.9.13","v3.9.14","v3.9.2","v3.9.3","v3.9.4","v3.9.5","v3.9.6","v3.9.7","v3.9.8","v3.9.9","v4.0.0","v4.0.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-35649.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}