← Zuruck zu CVEs
CVE-2025-34031
HIGH7.5
Beschreibung
A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/24/2025
Zuletzt geandert11/20/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
geoffrowland:jmol
Schwachen (CWE)
CWE-22CWE-22
Referenzen
https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal(disclosure@vulncheck.com)
https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46881(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46881(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.