CVE-2025-34031

HIGH EXPLOITED NUCLEI

Moodle LMS Jmol plugin <6.1 - Path Traversal

Title source: llm

Description

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.

Exploits (1)

exploitdb WORKING POC
by Dionach Ltd · textwebappsphp
https://www.exploit-db.com/exploits/46881

Nuclei Templates (1)

Moodle Jmol Filter 6.1 - Local File Inclusion
HIGHby madrobot

Scores

CVSS v3 7.5
EPSS 0.1830
EPSS Percentile 95.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2025-06-23
CWE
CWE-22
Status published
Products (2)
geoffrowland/jmol < 6.1
Moodle/Jmol Plugin < 6.1
Published Jun 24, 2025
Tracked Since Feb 18, 2026