We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34032

Moodle LMS Jmol Plugin Cross-site Scripting (XSS)



Description

A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.

Reserved 2025-04-15 | Published 2025-06-24 | Updated 2025-06-24 | Assigner VulnCheck


MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

CWE-20 Improper Input Validation

Product status

Default status
unaffected

Any version
affected

Credits

Dionach by Nomios finder

References

www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/ exploit technical-description

www.exploit-db.com/exploits/46881 third-party-advisory exploit

vulncheck.com/advisories/moodle-lms-jmol-plugin-xss third-party-advisory

cve.org (CVE-2025-34032)

nvd.nist.gov (CVE-2025-34032)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34032

Support options

Helpdesk Chat, Email, Knowledgebase