Skip to main content

CVE-2025-10445: SQL Injection in Campcodes Computer Sales and Inventory System

Medium
VulnerabilityCVE-2025-10445cvecve-2025-10445
Published: Mon Sep 15 2025 (09/15/2025, 12:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Computer Sales and Inventory System

Description

A weakness has been identified in Campcodes Computer Sales and Inventory System 1.0. Impacted is an unknown function of the file /pages/us_transac.php?action=add. Executing manipulation of the argument Username can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 09/15/2025, 12:39:44 UTC

Technical Analysis

CVE-2025-10445 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Computer Sales and Inventory System, specifically within the /pages/us_transac.php file when the action parameter is set to 'add'. The vulnerability arises due to improper sanitization or validation of the 'Username' argument, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the database. The CVSS 4.0 base score of 6.9 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability does not require authentication or user interaction, making it accessible to remote attackers scanning for vulnerable instances. The lack of available patches or mitigations from the vendor at this time further elevates the risk for affected deployments.

Potential Impact

For European organizations using Campcodes Computer Sales and Inventory System 1.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of sensitive sales and inventory data. Exploitation could lead to unauthorized disclosure of customer and transaction records, manipulation of inventory data causing operational disruptions, and potential financial losses. Given that the system likely interfaces with critical business processes such as sales tracking, inventory management, and possibly financial reporting, a successful attack could disrupt supply chains and customer relations. Additionally, compromised data could lead to regulatory non-compliance under GDPR, resulting in legal penalties and reputational damage. The remote and unauthenticated nature of the vulnerability increases the likelihood of automated scanning and exploitation attempts, especially as exploit code is publicly available. Organizations relying on this system without adequate compensating controls are at elevated risk.

Mitigation Recommendations

Immediate mitigation should focus on restricting external access to the vulnerable endpoint, such as implementing network-level controls (firewalls, VPNs) to limit exposure. Web application firewalls (WAFs) should be configured with rules to detect and block SQL injection patterns targeting the 'Username' parameter in the /pages/us_transac.php?action=add request. Input validation and sanitization should be implemented or enhanced on the server side to properly handle and escape user-supplied input. Organizations should monitor logs for suspicious activity related to this endpoint and conduct regular vulnerability scans to detect exploitation attempts. Since no official patch is currently available, consider isolating or replacing the vulnerable system with updated or alternative solutions. Additionally, applying the principle of least privilege to database accounts used by the application can limit the impact of a successful injection. Finally, organizations should prepare incident response plans specific to SQL injection attacks and ensure backups of critical data are current and secure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T15:45:32.506Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c808eec396be2414c8bd35

Added to database: 9/15/2025, 12:39:10 PM

Last enriched: 9/15/2025, 12:39:44 PM

Last updated: 9/15/2025, 1:12:40 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats