Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pj56-mpf8-xh3c

Опубликовано: 26 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.1
CVSS3: 6.1

Описание

A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.

A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.

EPSS

Процентиль: 30%
0.00115
Низкий

5.1 Medium

CVSS4

6.1 Medium

CVSS3

Дефекты

CWE-20
CWE-79

Связанные уязвимости

CVSS3: 6.1
nvd
8 месяцев назад

A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.

EPSS

Процентиль: 30%
0.00115
Низкий

5.1 Medium

CVSS4

6.1 Medium

CVSS3

Дефекты

CWE-20
CWE-79