Home

Description

Cross site scripting vulnerability in Moodle GeniAI plugin (local_geniai) 2.3.6. An authenticated user with Teacher role can upload a PDF containing embedded JavaScript. The assistant outputs a direct HTML link to the uploaded file without sanitization. When other users (including Students or Administrators) click the link, the payload executes in their browser.

PUBLISHED Reserved 2025-09-26 | Published 2025-10-21 | Updated 2025-10-21 | Assigner mitre




HIGH: 8.9CVSS:3.1/AC:L/AV:N/A:L/C:H/I:H/PR:L/S:C/UI:R

References

moodle.org/security/

onurcangenc.com.tr/...xss-via-pdf-upload-and-chatbot-ınput/

github.com/onurcangnc/moodle_genai_plugin_xss

moodle.org/plugins/local_geniai

cve.org (CVE-2025-60507)

nvd.nist.gov (CVE-2025-60507)

Download JSON