Cross site scripting vulnerability in Moodle GeniAI plugin (local_geniai) 2.3.6. An authenticated user with Teacher role can upload a PDF containing embedded JavaScript. The assistant outputs a direct HTML link to the uploaded file without sanitization. When other users (including Students or Administrators) click the link, the payload executes in their browser.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 21 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 18:00:00 +0000

Type Values Removed Values Added
Description Cross site scripting vulnerability in Moodle GeniAI plugin (local_geniai) 2.3.6. An authenticated user with Teacher role can upload a PDF containing embedded JavaScript. The assistant outputs a direct HTML link to the uploaded file without sanitization. When other users (including Students or Administrators) click the link, the payload executes in their browser.
References
Metrics cvssV3_1

{'score': 8.9, 'vector': 'CVSS:3.1/AC:L/AV:N/A:L/C:H/I:H/PR:L/S:C/UI:R'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T18:30:11.863Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60507

cve-icon Vulnrichment

Updated: 2025-10-21T18:29:34.597Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-21T18:15:36.457

Modified: 2025-10-21T19:31:25.450

Link: CVE-2025-60507

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.