A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.
References
Link | Resource |
---|---|
https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal | Third Party Advisory |
https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46881 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46881 | Exploit Third Party Advisory |
Configurations
History
09 Jul 2025, 19:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:geoffrowland:jmol:*:*:*:*:*:moodle:*:* | |
First Time |
Geoffrowland jmol
Geoffrowland |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal - Third Party Advisory | |
References | () https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/ - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46881 - Exploit, Third Party Advisory |
25 Jun 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://www.exploit-db.com/exploits/46881 - |
24 Jun 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
24 Jun 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 01:15
Updated : 2025-07-09 19:09
NVD link : CVE-2025-34031
Mitre link : CVE-2025-34031
CVE.ORG link : CVE-2025-34031
JSON object : View
Products Affected
geoffrowland
- jmol