{"id":"CVE-2023-34598","details":"Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible to include the content of several files present in the installation folder in the server's response.","modified":"2026-04-10T05:16:32.624572Z","published":"2023-06-29T15:15:09.530Z","references":[{"type":"EVIDENCE","url":"https://github.com/maddsec/CVE-2023-34598"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gibbonedu/core","events":[{"introduced":"0"},{"last_affected":"a563d781ae7202d5d14ec6bbbbba08bbda0e3e4d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"25.0.00"}]}}],"versions":["PR_Attendance","PR_Markbook_Sidebar","PR_Timetable_Tools","test-tag-3b","test-tag-4","test-tag-5","v10.0.00","v11.0.00","v12.0.00","v14.0.00","v14.0.01","v15.0.00","v15.0.01","v16.0.00","v16.0.01","v17.0.00","v18.0.00","v18.0.01","v19.0.00","v20.0.00","v21.0.00","v22.0.00","v22.0.00-pre","v23.0.00","v23.0.00-testbuild2","v24.0.00","v24.0.01","v25.0.00","v7.0.00","v7.0.01","v7.1.00","v7.1.01","v7.1.02","v8.0.00","v8.0.01","v8.0.02","v8.0.03","v8.0.04","v8.0.05","v8.0.06","v8.1.00","v8.2.00","v8.3.00","v9.0.00","v9.1.00"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-34598.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}