CVE-2025-10446: SQL Injection in Campcodes Computer Sales and Inventory System
A security vulnerability has been detected in Campcodes Computer Sales and Inventory System 1.0. The affected element is an unknown function of the file /pages/cust_searchfrm.php?action=edit. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10446 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the Campcodes Computer Sales and Inventory System. The vulnerability exists in an unspecified function within the file /pages/cust_searchfrm.php when accessed with the parameter 'action=edit'. Specifically, the 'ID' argument is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). Successful exploitation could lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data related to computer sales and inventory management. The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L), meaning partial compromise of data and system functionality is possible. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by opportunistic attackers. The lack of a patch or vendor advisory at this time necessitates immediate attention from organizations using this software. Given the nature of the system, which likely handles customer and inventory data, exploitation could result in data breaches, operational disruption, and potential financial losses.
Potential Impact
For European organizations using Campcodes Computer Sales and Inventory System 1.0, this vulnerability poses a tangible risk to business operations and data security. The SQL Injection flaw could allow attackers to exfiltrate sensitive customer information, manipulate inventory records, or disrupt sales processes, leading to financial and reputational damage. In regulated environments such as the EU, unauthorized data disclosure could trigger GDPR violations with significant fines. Additionally, compromised inventory systems may affect supply chain reliability and customer trust. Since the vulnerability requires no authentication and can be triggered remotely, attackers could automate exploitation attempts, increasing the likelihood of successful breaches. Organizations in sectors relying heavily on inventory and sales data, including retail, wholesale, and IT resellers, are particularly vulnerable. The medium severity rating suggests that while the impact is serious, it may not lead to full system takeover, but the partial compromise of data integrity and availability could still have substantial operational consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are running Campcodes Computer Sales and Inventory System version 1.0. Immediate steps include restricting external access to the affected web application, ideally by implementing network-level controls such as IP whitelisting or VPN access. Web Application Firewalls (WAFs) should be configured to detect and block SQL Injection patterns targeting the 'ID' parameter in /pages/cust_searchfrm.php. Organizations should conduct thorough input validation and parameterized query reviews within their deployment, applying custom patches or code fixes if vendor patches are unavailable. Regular monitoring of logs for suspicious SQL query patterns and anomalous database activity is essential. Additionally, organizations should prepare incident response plans for potential data breaches and consider isolating the affected system until remediation is complete. Engaging with the vendor for official patches or updates is critical, and applying them promptly once available will be necessary to fully resolve the issue.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10446: SQL Injection in Campcodes Computer Sales and Inventory System
Description
A security vulnerability has been detected in Campcodes Computer Sales and Inventory System 1.0. The affected element is an unknown function of the file /pages/cust_searchfrm.php?action=edit. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10446 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the Campcodes Computer Sales and Inventory System. The vulnerability exists in an unspecified function within the file /pages/cust_searchfrm.php when accessed with the parameter 'action=edit'. Specifically, the 'ID' argument is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). Successful exploitation could lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data related to computer sales and inventory management. The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L), meaning partial compromise of data and system functionality is possible. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by opportunistic attackers. The lack of a patch or vendor advisory at this time necessitates immediate attention from organizations using this software. Given the nature of the system, which likely handles customer and inventory data, exploitation could result in data breaches, operational disruption, and potential financial losses.
Potential Impact
For European organizations using Campcodes Computer Sales and Inventory System 1.0, this vulnerability poses a tangible risk to business operations and data security. The SQL Injection flaw could allow attackers to exfiltrate sensitive customer information, manipulate inventory records, or disrupt sales processes, leading to financial and reputational damage. In regulated environments such as the EU, unauthorized data disclosure could trigger GDPR violations with significant fines. Additionally, compromised inventory systems may affect supply chain reliability and customer trust. Since the vulnerability requires no authentication and can be triggered remotely, attackers could automate exploitation attempts, increasing the likelihood of successful breaches. Organizations in sectors relying heavily on inventory and sales data, including retail, wholesale, and IT resellers, are particularly vulnerable. The medium severity rating suggests that while the impact is serious, it may not lead to full system takeover, but the partial compromise of data integrity and availability could still have substantial operational consequences.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are running Campcodes Computer Sales and Inventory System version 1.0. Immediate steps include restricting external access to the affected web application, ideally by implementing network-level controls such as IP whitelisting or VPN access. Web Application Firewalls (WAFs) should be configured to detect and block SQL Injection patterns targeting the 'ID' parameter in /pages/cust_searchfrm.php. Organizations should conduct thorough input validation and parameterized query reviews within their deployment, applying custom patches or code fixes if vendor patches are unavailable. Regular monitoring of logs for suspicious SQL query patterns and anomalous database activity is essential. Additionally, organizations should prepare incident response plans for potential data breaches and consider isolating the affected system until remediation is complete. Engaging with the vendor for official patches or updates is critical, and applying them promptly once available will be necessary to fully resolve the issue.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-14T15:45:34.720Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c810b8b7a9c003946d30b4
Added to database: 9/15/2025, 1:12:24 PM
Last enriched: 9/15/2025, 1:12:49 PM
Last updated: 9/15/2025, 1:38:42 PM
Views: 4
Related Threats
CVE-2025-8396: CWE-770 Allocation of Resources Without Limits or Throttling in Temporal OSS Server
MediumCVE-2025-46408: n/a
HighCVE-2025-10448: SQL Injection in Campcodes Online Job Finder System
MediumCVE-2025-50944: n/a
HighCVE-2025-50110: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.