← Volver a CVEs
CVE-2025-34031
HIGH7.5
Descripcion
A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
Detalles CVE
Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/24/2025
Ultima modificacion11/20/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
geoffrowland:jmol
Debilidades (CWE)
CWE-22CWE-22
Referencias
https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal(disclosure@vulncheck.com)
https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46881(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46881(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.