Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-ba3v-4d8e-mfgx
Vulnerability ID VCID-ba3v-4d8e-mfgx
Aliases CVE-2008-1502
GHSA-v759-3wr5-p294
Summary Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual MODERATE http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
epss 0.01086 https://api.first.org/data/v1/epss?cve=CVE-2008-1502
epss 0.01086 https://api.first.org/data/v1/epss?cve=CVE-2008-1502
epss 0.01086 https://api.first.org/data/v1/epss?cve=CVE-2008-1502
epss 0.01086 https://api.first.org/data/v1/epss?cve=CVE-2008-1502
epss 0.01086 https://api.first.org/data/v1/epss?cve=CVE-2008-1502
epss 0.01086 https://api.first.org/data/v1/epss?cve=CVE-2008-1502
epss 0.01086 https://api.first.org/data/v1/epss?cve=CVE-2008-1502
epss 0.01086 https://api.first.org/data/v1/epss?cve=CVE-2008-1502
generic_textual MODERATE https://exchange.xforce.ibmcloud.com/vulnerabilities/41435
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-v759-3wr5-p294
generic_textual MODERATE https://github.com/moodle/moodle
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2008-1502
generic_textual MODERATE https://usn.ubuntu.com/658-1
generic_textual MODERATE https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424
generic_textual MODERATE https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017
generic_textual MODERATE https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018
generic_textual MODERATE https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167
generic_textual MODERATE https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400
generic_textual MODERATE https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446
generic_textual MODERATE https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986
generic_textual MODERATE https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073
generic_textual MODERATE https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491
generic_textual MODERATE https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html
generic_textual MODERATE http://www.debian.org/security/2008/dsa-1691
generic_textual MODERATE http://www.debian.org/security/2009/dsa-1871
generic_textual MODERATE http://www.egroupware.org/changelog
generic_textual MODERATE http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110
generic_textual MODERATE http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2008/07/08/14
Reference id Reference type URL
http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1502.json
https://api.first.org/data/v1/epss?cve=CVE-2008-1502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502
https://exchange.xforce.ibmcloud.com/vulnerabilities/41435
https://github.com/moodle/moodle
https://usn.ubuntu.com/658-1
https://usn.ubuntu.com/658-1/
https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424
https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017
https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018
https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167
https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400
https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446
https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986
https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073
https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html
http://www.debian.org/security/2008/dsa-1691
http://www.debian.org/security/2009/dsa-1871
http://www.egroupware.org/changelog
http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110
http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml
http://www.openwall.com/lists/oss-security/2008/07/08/14
454246 https://bugzilla.redhat.com/show_bug.cgi?id=454246
504243 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504243
CVE-2008-1502 https://nvd.nist.gov/vuln/detail/CVE-2008-1502
GHSA-v759-3wr5-p294 https://github.com/advisories/GHSA-v759-3wr5-p294
GLSA-200805-04 https://security.gentoo.org/glsa/200805-04
No exploits are available.
Exploit Prediction Scoring System (EPSS)
Percentile 0.77845
EPSS Score 0.01086
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:49:58.555076+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/moodle/moodle/CVE-2008-1502.yml 38.0.0