← Retour aux CVEs
CVE-2025-34031
HIGH7.5
Description
A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie6/24/2025
Derniere modification11/20/2025
Sourcenvd
Observations honeypot0
Produits affectes
geoffrowland:jmol
Faiblesses (CWE)
CWE-22CWE-22
References
https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal(disclosure@vulncheck.com)
https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46881(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/46881(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.