Description
A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
Published: 2025-06-24
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected XSS enabling session hijack
Action: Apply Patch
AI Analysis

Impact

A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and earlier via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.

Affected Systems

The vulnerability affects the Moodle Jmol Plugin, specifically versions 6.1 and earlier. Administrators should verify which version they are running and update accordingly.

Risk and Exploitability

The CVSS score of 5.1 reflects a moderate severity, but the EPSS score of < 1% indicates a low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, suggesting no known large-scale exploitation. The likely attack vector is a reflected XSS via a crafted URL that an unsuspecting user may click; an attacker could then hijack sessions or alter content. Current evidence of exploitation was observed by the Shadowserver Foundation on 2025-02-02 UTC.

Generated by OpenCVE AI on April 28, 2026 at 01:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched or newer version of the Moodle Jmol plugin (e.g., 6.2 or later) when it becomes available.
  • If an upgrade is not possible, disable the Jmol plugin or remove the data parameter from jsmol.php to prevent XSS injection.
  • Implement input validation or sanitization on the data parameter to escape or strip JavaScript payloads.
  • Deploy a web application firewall or security plugin to block reflected XSS attempts.

Generated by OpenCVE AI on April 28, 2026 at 01:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18970 A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.
History

Thu, 20 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC. A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.

Wed, 19 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Wed, 19 Nov 2025 21:45:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content. A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC.

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0083}

epss

{'score': 0.00192}


Wed, 09 Jul 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Geoffrowland
Geoffrowland jmol
CPEs cpe:2.3:a:geoffrowland:jmol:*:*:*:*:*:moodle:*:*
Vendors & Products Geoffrowland
Geoffrowland jmol
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Wed, 25 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Jun 2025 04:45:00 +0000

Type Values Removed Values Added
References

Tue, 24 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
References

Tue, 24 Jun 2025 01:15:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.
Title Moodle LMS Jmol Plugin Cross-site Scripting (XSS)
Weaknesses CWE-20
CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Geoffrowland Jmol
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:07.839Z

Reserved: 2025-04-15T19:15:22.546Z

Link: CVE-2025-34032

cve-icon Vulnrichment

Updated: 2025-06-25T12:37:26.091Z

cve-icon NVD

Status : Modified

Published: 2025-06-24T01:15:24.350

Modified: 2025-11-20T22:15:55.707

Link: CVE-2025-34032

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T01:30:17Z

Weaknesses