We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34031

Moodle LMS Jmol Plugin Path Traversal



Description

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.

Reserved 2025-04-15 | Published 2025-06-24 | Updated 2025-06-24 | Assigner VulnCheck


HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-20 Improper Input Validation

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

Any version
affected

Credits

Dionach by Nomios finder

References

www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/ exploit technical-description

www.exploit-db.com/exploits/46881 third-party-advisory exploit

vulncheck.com/...ories/moodle-lms-jmol-plugin-path-traversal third-party-advisory

cve.org (CVE-2025-34031)

nvd.nist.gov (CVE-2025-34031)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34031

Support options

Helpdesk Chat, Email, Knowledgebase