A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.
References
Link | Resource |
---|---|
https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal | Third Party Advisory |
https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46881 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46881 | Exploit Third Party Advisory |
Configurations
History
09 Jul 2025, 19:09
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 01:15
Updated : 2025-07-09 19:09
NVD link : CVE-2025-34031
Mitre link : CVE-2025-34031
CVE.ORG link : CVE-2025-34031
JSON object : View
Products Affected
geoffrowland
- jmol