CVE-2025-34031

HIGH

CVSS v3

7.5

HIGH

EPSS Score

18.3%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was

Technical Details

CVSS v3 Vector
3.1
Published
6/24/2025
Last Modified
11/20/2025

Frequently Asked Questions

What is CVE-2025-34031?

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials. Exploitation evidence was

Is CVE-2025-34031 actively exploited?

Active exploitation of CVE-2025-34031 has not been confirmed. The EPSS score is 18.3%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-34031?

CVE-2025-34031 has a CVSS v3 base score of 7.5 (HIGH severity), with vector string 3.1.

Is CVE-2025-34031 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.