Skip to main content

CVE-2025-10435: SQL Injection in Campcodes Computer Sales and Inventory System

Medium
VulnerabilityCVE-2025-10435cvecve-2025-10435
Published: Mon Sep 15 2025 (09/15/2025, 09:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Computer Sales and Inventory System

Description

A security flaw has been discovered in Campcodes Computer Sales and Inventory System 1.0. The affected element is an unknown function of the file /pages/cust_edit1.php. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 09/15/2025, 17:02:46 UTC

Technical Analysis

CVE-2025-10435 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Computer Sales and Inventory System. The flaw exists in an unspecified function within the /pages/cust_edit1.php file, where the manipulation of the 'ID' parameter allows an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection potentially allows an attacker to read, modify, or delete database contents, impacting confidentiality, integrity, and availability of the system's data. The CVSS score of 6.9 classifies this as a medium severity issue, reflecting that while exploitation is straightforward and does not require privileges, the overall impact is somewhat limited (VC:L/VI:L/VA:L) and no scope change occurs. No patches or fixes have been published yet, and although no known exploits are currently observed in the wild, a public exploit has been released, increasing the risk of active exploitation. The vulnerability affects only version 1.0 of the product, which is a specialized sales and inventory management system likely used by small to medium-sized businesses for managing computer sales and inventory data. The lack of authentication requirement and remote exploitability make this vulnerability particularly dangerous for exposed web servers running this software without proper protections.

Potential Impact

For European organizations using Campcodes Computer Sales and Inventory System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of their sales and inventory data. Successful exploitation could lead to unauthorized data disclosure, alteration of inventory records, or disruption of sales operations. This could result in financial losses, reputational damage, and regulatory non-compliance, especially under GDPR where personal or customer data might be involved. Since the vulnerability allows remote exploitation without authentication, attackers could leverage this flaw to gain persistent access or pivot to other internal systems. The medium severity rating suggests that while the impact is serious, it may not lead to full system compromise or widespread availability issues. However, organizations relying heavily on this system for operational continuity could face business disruption. The absence of a patch increases the urgency for interim mitigations. Given the public availability of an exploit, European entities should consider this a credible threat that requires immediate attention to prevent data breaches or operational impact.

Mitigation Recommendations

Specific mitigations include: 1) Immediate network-level protections such as web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting the 'ID' parameter in /pages/cust_edit1.php. 2) Restricting external access to the affected application by implementing VPNs or IP whitelisting to reduce exposure. 3) Conducting thorough input validation and parameterized queries in the application code to prevent SQL injection; if source code access is available, prioritize patching the vulnerable function. 4) Monitoring database and application logs for suspicious queries or unusual activity related to the 'ID' parameter. 5) Isolating the affected system within the network to limit lateral movement in case of compromise. 6) Planning for an upgrade or patch deployment as soon as a vendor fix becomes available. 7) Conducting a security audit of the entire application to identify and remediate other potential injection points. These steps go beyond generic advice by focusing on immediate protective controls and proactive detection tailored to the specific vulnerability vector and affected component.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T10:31:28.738Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c8469be8cf1c517349384b

Added to database: 9/15/2025, 5:02:19 PM

Last enriched: 9/15/2025, 5:02:46 PM

Last updated: 9/15/2025, 6:08:44 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats