Skip to content

Commit ba55f59

Browse files
1 parent 9aa8314 commit ba55f59

File tree

2 files changed

+57
-11
lines changed

2 files changed

+57
-11
lines changed

advisories/unreviewed/2025/11/GHSA-fqq7-h225-8w6h/GHSA-fqq7-h225-8w6h.json renamed to advisories/github-reviewed/2025/11/GHSA-fqq7-h225-8w6h/GHSA-fqq7-h225-8w6h.json

Lines changed: 30 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-fqq7-h225-8w6h",
4-
"modified": "2025-11-09T09:30:15Z",
4+
"modified": "2025-12-12T16:39:00Z",
55
"published": "2025-11-09T09:30:15Z",
66
"aliases": [
77
"CVE-2025-12918"
88
],
9+
"summary": "Skuul School Management System has an Insecure Direct Object Reference (IDOR) Vulnerability in View Fee Invoice",
910
"details": "A security flaw has been discovered in yungifez Skuul School Management System up to 2.6.5. The impacted element is an unknown function of the file /dashboard/fees/fee-invoices/ of the component View Fee Invoice. Performing manipulation of the argument invoice_id results in improper control of resource identifiers. Remote exploitation of the attack is possible. The attack is considered to have high complexity. The exploitability is regarded as difficult. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.",
1011
"severity": [
1112
{
@@ -14,10 +15,30 @@
1415
},
1516
{
1617
"type": "CVSS_V4",
17-
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
18+
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "Packagist",
25+
"name": "yungifez/skuul"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"last_affected": "2.6.4"
36+
}
37+
]
38+
}
39+
]
1840
}
1941
],
20-
"affected": [],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -31,6 +52,10 @@
3152
"type": "WEB",
3253
"url": "https://gist.github.com/thezeekhan/fbfa9a7dbc0b0b81fd868ee166839041#steps-to-reproduce"
3354
},
55+
{
56+
"type": "PACKAGE",
57+
"url": "https://github.com/yungifez/skuul"
58+
},
3459
{
3560
"type": "WEB",
3661
"url": "https://vuldb.com/?ctiid.331636"
@@ -50,8 +75,8 @@
5075
"CWE-99"
5176
],
5277
"severity": "LOW",
53-
"github_reviewed": false,
54-
"github_reviewed_at": null,
78+
"github_reviewed": true,
79+
"github_reviewed_at": "2025-12-12T16:39:00Z",
5580
"nvd_published_at": "2025-11-09T08:15:38Z"
5681
}
5782
}

advisories/unreviewed/2025/12/GHSA-947q-2xw3-gx9c/GHSA-947q-2xw3-gx9c.json renamed to advisories/github-reviewed/2025/12/GHSA-947q-2xw3-gx9c/GHSA-947q-2xw3-gx9c.json

Lines changed: 27 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-947q-2xw3-gx9c",
4-
"modified": "2025-12-12T00:30:21Z",
4+
"modified": "2025-12-12T16:39:20Z",
55
"published": "2025-12-12T00:30:21Z",
66
"aliases": [
77
"CVE-2024-58303"
88
],
9+
"summary": "FoF Pretty Mail has a server-side template injection vulnerability",
910
"details": "FoF Pretty Mail 1.1.2 contains a server-side template injection vulnerability that allows administrative users to inject malicious code into email templates. Attackers can execute system commands by inserting crafted template expressions that trigger arbitrary code execution during email generation.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V4",
13-
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "fof/pretty-mail"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "1.1.2"
32+
}
33+
]
34+
}
35+
]
1436
}
1537
],
16-
"affected": [],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -24,7 +45,7 @@
2445
"url": "https://flarum.org"
2546
},
2647
{
27-
"type": "WEB",
48+
"type": "PACKAGE",
2849
"url": "https://github.com/FriendsOfFlarum/pretty-mail"
2950
},
3051
{
@@ -41,8 +62,8 @@
4162
"CWE-1336"
4263
],
4364
"severity": "HIGH",
44-
"github_reviewed": false,
45-
"github_reviewed_at": null,
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2025-12-12T16:39:19Z",
4667
"nvd_published_at": "2025-12-11T22:15:51Z"
4768
}
4869
}

0 commit comments

Comments
 (0)