CVE-2025-48373

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48373
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-48373.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-48373
Aliases
  • GHSA-37h9-qq7c-6mc9
Published
2025-05-22T21:15:37Z
Modified
2025-05-23T17:57:51.918089Z
Summary
[none]
Details

Schule is open-source school management system software. The application relies on client-side JavaScript (index.js) to redirect users to different panels based on their role. Prior to version 1.0.1, this implementation poses a serious security risk because it assumes that the value of data.role is trustworthy on the client side. Attackers can manipulate JavaScript in the browser (e.g., via browser dev tools or intercepting API responses) and set data.role to any arbitrary value (e.g., "admin"), gaining unauthorized access to restricted areas of the application.

References

Affected packages

Git / github.com/schule111/schule

Affected ranges

Type
GIT
Repo
https://github.com/schule111/schule
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

school
schools