Skip to main content

CVE-2025-10415: SQL Injection in Campcodes Grocery Sales and Inventory System

Medium
VulnerabilityCVE-2025-10415cvecve-2025-10415
Published: Sun Sep 14 2025 (09/14/2025, 23:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Grocery Sales and Inventory System

Description

A vulnerability was determined in Campcodes Grocery Sales and Inventory System 1.0. This affects an unknown function of the file /ajax.php?action=save_supplier. Executing manipulation of the argument ID can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 09/15/2025, 00:09:20 UTC

Technical Analysis

CVE-2025-10415 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Grocery Sales and Inventory System. The vulnerability exists in the /ajax.php endpoint, specifically when the 'action' parameter is set to 'save_supplier'. Manipulation of the 'ID' argument in this request allows an attacker to inject malicious SQL code. This injection flaw enables unauthorized database queries to be executed remotely without requiring authentication or user interaction. The vulnerability is classified with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network exploitability (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated as low individually but combined can lead to significant data exposure or modification. The vulnerability affects an unknown function within the specified file, indicating that the exact database operations impacted are not fully disclosed. No official patches or mitigations have been published yet, and while public exploit code is available, there are no confirmed reports of active exploitation in the wild. This vulnerability poses a risk to organizations using this specific inventory system, as attackers can remotely manipulate supplier data or potentially escalate to broader database compromise through crafted SQL payloads.

Potential Impact

For European organizations using Campcodes Grocery Sales and Inventory System 1.0, this vulnerability could lead to unauthorized access to sensitive supplier and inventory data, potentially exposing business-critical information such as supplier identities, pricing, stock levels, and transaction records. Data integrity could be compromised by unauthorized modification or deletion of records, disrupting supply chain operations and financial reporting. Although the vulnerability is rated medium severity, the lack of required authentication and ease of exploitation increase the risk of automated attacks. This could result in operational downtime, financial losses, and reputational damage. Additionally, if attackers leverage this vulnerability to pivot within the network, it could facilitate further compromise of internal systems. Given the retail and supply chain importance of grocery inventory systems, disruption could have cascading effects on logistics and customer service in European markets.

Mitigation Recommendations

Organizations should immediately audit their use of Campcodes Grocery Sales and Inventory System version 1.0 and restrict external access to the affected /ajax.php endpoint, ideally limiting it to trusted internal networks. Implementing Web Application Firewalls (WAFs) with specific SQL injection detection rules targeting the 'save_supplier' action and 'ID' parameter can provide interim protection. Input validation and parameterized queries should be enforced in the application code to prevent injection, though this requires vendor patching. Until an official patch is released, organizations should consider isolating or replacing the vulnerable system, or applying virtual patching via network controls. Regular monitoring of logs for suspicious SQL queries or unusual database activity is recommended to detect exploitation attempts early. Additionally, organizations should maintain up-to-date backups of inventory and supplier data to enable recovery in case of data tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T06:23:12.060Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7591939776bc2a1466a4b

Added to database: 9/15/2025, 12:08:57 AM

Last enriched: 9/15/2025, 12:09:20 AM

Last updated: 9/15/2025, 2:47:53 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats