Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13785: Information Disclosure in yungifez Skuul School Management System

0
Medium
VulnerabilityCVE-2025-13785cvecve-2025-13785
Published: Sun Nov 30 2025 (11/30/2025, 07:32:05 UTC)
Source: CVE Database V5
Vendor/Project: yungifez
Product: Skuul School Management System

Description

A security vulnerability has been detected in yungifez Skuul School Management System up to 2.6.5. This issue affects some unknown processing of the file /user/profile of the component Image Handler. Such manipulation leads to information disclosure. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/30/2025, 07:52:35 UTC

Technical Analysis

CVE-2025-13785 is an information disclosure vulnerability identified in the yungifez Skuul School Management System, specifically affecting versions 2.6.0 through 2.6.5. The flaw exists in the Image Handler component's processing of the /user/profile endpoint, where improper handling allows an attacker to remotely retrieve sensitive information. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited over the network, making it relatively easy to leverage. The disclosed CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates a low complexity attack with partial impact on confidentiality. The vendor has been notified but has not issued any patches or advisories, leaving systems exposed. While no active exploitation has been reported, the public disclosure of the exploit code increases the risk of future attacks. The vulnerability primarily risks unauthorized disclosure of potentially sensitive user profile data, which could include personally identifiable information (PII) of students and staff managed within the school system. This exposure could lead to privacy violations, compliance issues under regulations such as GDPR, and reputational damage to affected institutions. The lack of vendor response complicates remediation efforts, requiring organizations to rely on compensating controls and monitoring.

Potential Impact

For European organizations, particularly educational institutions using the yungifez Skuul School Management System, this vulnerability poses a significant risk of unauthorized information disclosure. Exposure of student and staff personal data could violate GDPR and other privacy regulations, leading to legal penalties and loss of trust. The information disclosed might be used for targeted phishing, identity theft, or further attacks against the institution. Since the vulnerability can be exploited remotely without authentication, attackers could operate from outside the network perimeter, increasing the threat surface. The absence of vendor patches means that affected organizations must rely on network defenses and monitoring, which may not fully prevent exploitation. Additionally, the public availability of exploit details raises the likelihood of opportunistic attacks. The impact extends beyond confidentiality to potential operational disruptions if attackers leverage disclosed information for social engineering or other attack vectors.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement several specific mitigations: 1) Restrict external network access to the /user/profile endpoint using firewalls or web application firewalls (WAFs) to limit exposure only to trusted internal networks or VPN users. 2) Employ strict access controls and monitoring on the school management system servers to detect unusual requests or data access patterns targeting the Image Handler component. 3) Conduct regular audits of user profile data stored in the system to minimize sensitive information exposure and ensure compliance with data minimization principles. 4) Implement network segmentation to isolate the school management system from other critical infrastructure. 5) Use intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts related to this vulnerability. 6) Educate IT staff and users about the risk and signs of exploitation attempts. 7) Consider temporary migration to alternative school management solutions or offline operation modes until a vendor patch or official fix is available. 8) Maintain up-to-date backups of critical data to ensure recovery in case of compromise. 9) Engage with cybersecurity communities and threat intelligence sources for updates on exploit developments and mitigation strategies.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-29T12:59:44.505Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692bf7b982f933c5fe612651

Added to database: 11/30/2025, 7:52:25 AM

Last enriched: 11/30/2025, 7:52:35 AM

Last updated: 11/30/2025, 9:04:52 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats