EUVD-2025-18971

| CVE-2025-34031 HIGH
2025-06-24 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-18971
PoC Detected
Nov 20, 2025 - 22:15 vuln.today
Public exploit code
CVE Published
Jun 24, 2025 - 01:15 nvd
HIGH 7.5

Description

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.

Analysis

The Moodle LMS Jmol plugin version 6.1 and earlier contains a path traversal vulnerability in jsmol.php. The query parameter is passed directly to file_get_contents() without validation, allowing unauthenticated attackers to read arbitrary files from the Moodle server including configuration files with database credentials.

Technical Context

The jsmol.php script passes the query parameter directly to file_get_contents() without path sanitization. An attacker can traverse directories to read any file accessible to the web server process, including Moodle's config.php which contains database credentials, secret keys, and LDAP configuration.

Affected Products

['Moodle Jmol plugin <= 6.1']

Remediation

Remove or update the Jmol plugin. Implement path validation in jsmol.php. Rotate database credentials. Review Moodle access logs for path traversal attempts.

Priority Score

70
Low Medium High Critical
KEV: 0
EPSS: +12.2
CVSS: +38
POC: +20

Share

EUVD-2025-18971 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy