Description
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.
Remediation
References
Related Vulnerabilities
WordPress Plugin OneClick Chat to Order Cross-Site Scripting (1.0.4.1)
WordPress Plugin Patreon WordPress Multiple Cross-Site Scripting Vulnerabilities (1.7.1)
MySQL CVE-2022-21314 Vulnerability (CVE-2022-21314)
WordPress Plugin WP Infusionsoft WooCommerce Cross-Site Scripting (1.0.8)
WordPress Plugin BSDev.at-Importer:Serendipity Cross-Site Scripting (0.0.1)