A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
References
| Link | Resource |
|---|---|
| https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal | Third Party Advisory |
| https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/ | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/46881 | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/46881 | Exploit Third Party Advisory |
Configurations
History
20 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC. |
19 Nov 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-20 |
|
| Summary | (en) A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC. |
09 Jul 2025, 19:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:geoffrowland:jmol:*:*:*:*:*:moodle:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal - Third Party Advisory | |
| References | () https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/ - Exploit, Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/46881 - Exploit, Third Party Advisory | |
| First Time |
Geoffrowland
Geoffrowland jmol |
25 Jun 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/46881 - | |
| Summary |
|
24 Jun 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
24 Jun 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-24 01:15
Updated : 2025-11-20 22:15
NVD link : CVE-2025-34031
Mitre link : CVE-2025-34031
CVE.ORG link : CVE-2025-34031
JSON object : View
Products Affected
geoffrowland
- jmol
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
