[CVE REQUESTED] Debugging Stack Trace Disclosure on Ednovation Dashboard Subdomain
Summary
A debugging error disclosure vulnerability exists on Ednovation’s https://dashboard.ednoland.com/
subdomain.
By requesting a non-existent path, the application returns a full Laravel exception stack trace, exposing sensitive framework and server information.
Ednovation, headquartered in Singapore, is a leading provider of preschool education services across Asia, has evolved into a chain of more than 60 pre-schools and enrichment centres across Singapore, China and ASEAN.
Background & Discovery
While testing the ParentCommApp iOS mobile application, a related Ednovation subdomain was identified https://dashboard.ednoland.com/
Accessing an invalid route such as https://dashboard.ednoland.com/test
or when accessing a file download endpoint (e.g., /public/assets/[type]/[file]
triggers a detailed Laravel error page, revealing internal application details.
Affected Product
- Vendor: Ednovation
- Subdomain:
https://dashboard.ednoland.com
- Technology: Laravel PHP Framework
- Environment: Production
Vulnerability Details
The application displays a full Laravel exception trace:
- Internal PHP file paths
- Class, method and parameter names
- Laravel routing internals
- Middleware chain
- Application kernel details
- Potentially framework version information
Exploitation
Attackers can use this vulnerability to:
- Identify the PHP/Laravel version and framework internals.
- Map internal class structures, middleware, and routing logic.
- Fingerprint the operating system and server configuration.
- Craft malicious inputs for path traversal attacks, potentially accessing sensitive files like configuration files or source code.
- Develop targeted exploitation strategies.
Impact
- Information disclosure: Reveals sensitive environment details.
- Increased attack surface: Assists in developing targeted attacks against known vulnerabilities in the Laravel/PHP stack.
- Potential pivot point: May aid in chaining with other vulnerabilities.
Mitigation
- Disable detailed error pages in production by setting
APP_DEBUG=false
in Laravel.env
. - Ensure a generic 404/500 error handler is configured.
- Restrict verbose stack traces to local development environments only.
Timeline
- 2025-07: Vulnerability discovered during mobile app-related subdomain testing and responsibly reported to vendor
- 2025-08: Vendor acknowledged and deployed a patch
- 2025-08: Public disclosure and CVE request initiated