CVE-2025-12918

3.1 LOW

📋 TL;DR

This vulnerability in yungifez Skuul School Management System allows attackers to manipulate resource identifiers through the invoice_id parameter in the fee invoice view component. It affects all versions up to 2.6.5, potentially enabling unauthorized access to fee invoice data. Remote exploitation is possible but requires high complexity.

💻 Affected Systems

Products:
  • yungifez Skuul School Management System
Versions: Up to and including version 2.6.5
Operating Systems: Any OS running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /dashboard/fees/fee-invoices/ component specifically. All installations using vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized access to sensitive student fee information, financial data exposure, and potential data manipulation affecting billing records.

🟠

Likely Case

Limited information disclosure of fee invoice details for unauthorized users who can craft specific requests.

🟢

If Mitigated

No impact with proper input validation and access controls in place.

🌐 Internet-Facing: MEDIUM - Remote exploitation is possible but requires high complexity and specific knowledge of the system.
🏢 Internal Only: MEDIUM - Internal attackers with network access could potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploit details are publicly available on GitHub gist. The vendor has not responded to disclosure attempts. Attack requires manipulation of invoice_id parameter with specific knowledge of the system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to any version above 2.6.5 if released by vendor, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and sanitization of the invoice_id parameter to ensure only valid, authorized values are accepted.

Modify /dashboard/fees/fee-invoices/ controller to validate invoice_id against user permissions and expected format

Access Control Enhancement

all

Strengthen access controls to verify user authorization for each invoice_id before processing the request.

Add authorization checks in the fee invoice view function to validate user has permission to access specific invoice

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block suspicious invoice_id parameter patterns
  • Restrict network access to the application to only authorized users and networks

🔍 How to Verify

Check if Vulnerable:

Check if your system is running yungifez Skuul School Management System version 2.6.5 or earlier. Test by attempting to access fee invoices with manipulated invoice_id parameters while monitoring for unauthorized data access.

Check Version:

Check application version in admin panel or configuration files. For web interface, typically visible in footer or about page.

Verify Fix Applied:

After implementing workarounds, test that manipulated invoice_id parameters no longer return unauthorized data and that proper access controls are enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /dashboard/fees/fee-invoices/ with non-sequential or unexpected invoice_id values
  • Multiple failed authorization attempts for fee invoice access

Network Indicators:

  • HTTP requests to fee invoice endpoint with manipulated invoice_id parameters
  • Unusual traffic patterns to the fee management component

SIEM Query:

source="web_server" AND (uri_path="/dashboard/fees/fee-invoices/" AND (query_parameter="invoice_id" AND value NOT regex "^[0-9]+$"))

🔗 References

📤 Share & Export