CVE-2025-34031
HIGH EXPLOITED NUCLEIMoodle LMS Jmol plugin <6.1 - Path Traversal
Title source: llmDescription
A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
Exploits (1)
Nuclei Templates (1)
Moodle Jmol Filter 6.1 - Local File Inclusion
HIGHby madrobot
Scores
CVSS v3
7.5
EPSS
0.1830
EPSS Percentile
95.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2025-06-23
CWE
CWE-22
Status
published
Products (2)
geoffrowland/jmol
< 6.1
Moodle/Jmol Plugin
< 6.1
Published
Jun 24, 2025
Tracked Since
Feb 18, 2026