A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.
CVSS
No CVSS.
References
Configurations
No configuration.
History
25 Jun 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://www.exploit-db.com/exploits/46881 - |
24 Jun 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
24 Jun 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 01:15
Updated : 2025-06-26 18:58
NVD link : CVE-2025-34031
Mitre link : CVE-2025-34031
CVE.ORG link : CVE-2025-34031
JSON object : View
Products Affected
No product.