Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60507: n/a

0
High
VulnerabilityCVE-2025-60507cvecve-2025-60507
Published: Tue Oct 21 2025 (10/21/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross site scripting vulnerability in Moodle GeniAI plugin (local_geniai) 2.3.6. An authenticated user with Teacher role can upload a PDF containing embedded JavaScript. The assistant outputs a direct HTML link to the uploaded file without sanitization. When other users (including Students or Administrators) click the link, the payload executes in their browser.

AI-Powered Analysis

AILast updated: 10/21/2025, 18:02:02 UTC

Technical Analysis

CVE-2025-60507 is a cross-site scripting (XSS) vulnerability identified in the Moodle GeniAI plugin (local_geniai) version 2.3.6. The vulnerability arises because an authenticated user with the Teacher role can upload a PDF file that contains embedded JavaScript code. The plugin then generates a direct HTML link to this uploaded file without properly sanitizing or encoding the link output. When other users, including Students or Administrators, click on this link, the embedded JavaScript executes within their browsers. This execution context allows the attacker to perform actions such as stealing session cookies, performing actions on behalf of the victim, or injecting malicious content. The vulnerability requires the attacker to have at least Teacher-level authentication and relies on user interaction (clicking the malicious link). The CVSS v3.1 score is 8.9, indicating high severity, with a vector showing low attack complexity, network attack vector, low privileges required, and user interaction necessary. The vulnerability affects confidentiality and integrity and has a scope change due to the potential for privilege escalation or lateral movement within the Moodle environment. No patches or known exploits are currently available, but the risk is significant given Moodle's widespread use in educational institutions globally.

Potential Impact

For European organizations, particularly educational institutions and universities that widely deploy Moodle as their learning management system, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive educational data, including student records, grades, and personal information. The ability to execute arbitrary scripts in the browsers of administrators or students could facilitate session hijacking, credential theft, or the spread of malware within the network. This could disrupt educational operations, damage institutional reputation, and lead to regulatory non-compliance under GDPR due to data breaches. The requirement for authenticated access limits the attack surface but does not eliminate risk, as teachers are legitimate users. The vulnerability could also be leveraged for targeted attacks or social engineering campaigns within the academic community. The lack of available patches increases the urgency for organizations to implement compensating controls.

Mitigation Recommendations

1. Immediately restrict upload permissions to trusted users only and review the roles allowed to upload files, especially PDFs. 2. Implement input validation and output encoding on the plugin to sanitize any links generated to uploaded files, preventing execution of embedded scripts. 3. Disable or limit the use of the GeniAI plugin until a patch or update is available. 4. Educate teachers and users about the risks of uploading untrusted files and clicking on suspicious links within the Moodle environment. 5. Monitor Moodle logs for unusual upload activity or access patterns to detect potential exploitation attempts. 6. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 7. Regularly update Moodle and its plugins to the latest versions once patches addressing this vulnerability are released. 8. Consider network segmentation and access controls to limit the spread of any compromise resulting from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7c9acdde5d1d51b5517bd

Added to database: 10/21/2025, 5:58:04 PM

Last enriched: 10/21/2025, 6:02:02 PM

Last updated: 10/24/2025, 5:28:43 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats