Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13784: Cross Site Scripting in yungifez Skuul School Management System

0
Medium
VulnerabilityCVE-2025-13784cvecve-2025-13784
Published: Sun Nov 30 2025 (11/30/2025, 07:02:05 UTC)
Source: CVE Database V5
Vendor/Project: yungifez
Product: Skuul School Management System

Description

A weakness has been identified in yungifez Skuul School Management System up to 2.6.5. This vulnerability affects unknown code of the file /dashboard/schools/1/edit of the component SVG File Handler. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/07/2025, 08:25:42 UTC

Technical Analysis

CVE-2025-13784 identifies a cross-site scripting (XSS) vulnerability in the yungifez Skuul School Management System, affecting versions 2.6.0 through 2.6.5. The vulnerability resides in the SVG File Handler component, particularly in the /dashboard/schools/1/edit endpoint, where insufficient input sanitization allows an attacker to inject malicious scripts. This flaw can be exploited remotely without the need for authentication bypass, but it requires the attacker to have high privileges and user interaction to trigger the malicious payload. The vulnerability impacts the confidentiality and integrity of data by enabling script execution in the context of authenticated users, potentially leading to session hijacking, data theft, or unauthorized actions within the system. The vendor was notified early but has not issued any patches or responses, and while exploit code is publicly available, there are no confirmed reports of active exploitation in the wild. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the attack vector is network-based, with low complexity but requiring user interaction and high privileges. The lack of scope change and absence of authentication bypass limit the overall impact but do not eliminate the risk, especially in environments where the system is widely used. The vulnerability highlights the need for improved input validation and secure handling of SVG files within web applications managing sensitive educational data.

Potential Impact

For European organizations, particularly educational institutions using the yungifez Skuul School Management System, this vulnerability poses risks to the confidentiality and integrity of sensitive student and staff data. Exploitation could allow attackers to execute arbitrary scripts within the context of authenticated users, potentially leading to session hijacking, unauthorized data access, or manipulation of school management information. This could disrupt administrative operations, damage institutional reputation, and violate data protection regulations such as GDPR. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate targeted attacks, especially from insider threats or advanced persistent threat actors. The absence of vendor response and patches increases the window of exposure, necessitating proactive defensive measures. Additionally, compromised systems could be leveraged as footholds for broader network attacks within educational networks, impacting availability and trust in digital learning environments.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement several specific mitigations: 1) Restrict access to the /dashboard/schools/1/edit endpoint to only trusted and necessary users, employing network segmentation and strict access controls. 2) Implement web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting SVG file handling and XSS patterns. 3) Conduct thorough input validation and sanitization on all user-supplied data, especially SVG content, to prevent script injection. 4) Monitor logs and user activity for unusual behavior indicative of exploitation attempts, including repeated access to the vulnerable endpoint or unexpected script execution. 5) Educate privileged users about the risks of interacting with untrusted content and the importance of cautious behavior to reduce user interaction exploitation vectors. 6) Consider deploying Content Security Policy (CSP) headers to limit the impact of potential XSS attacks by restricting script execution sources. 7) Explore temporary alternatives or patches from community sources if vendor support remains unavailable. 8) Plan for timely updates once official patches are released and maintain an incident response plan tailored to web application attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-29T12:59:34.961Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692befdd450a33c8c67db72f

Added to database: 11/30/2025, 7:18:53 AM

Last enriched: 12/7/2025, 8:25:42 AM

Last updated: 1/14/2026, 11:31:43 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats