Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10447: Unrestricted Upload in Campcodes Online Job Finder System

0
Medium
VulnerabilityCVE-2025-10447cvecve-2025-10447
Published: Mon Sep 15 2025 (09/15/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Job Finder System

Description

A vulnerability was detected in Campcodes Online Job Finder System 1.0. The impacted element is an unknown function of the file /eris/applicationform.php. The manipulation of the argument picture results in unrestricted upload. It is possible to launch the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/15/2025, 13:38:49 UTC

Technical Analysis

CVE-2025-10447 is a medium-severity vulnerability affecting Campcodes Online Job Finder System version 1.0. The vulnerability arises from an unrestricted file upload flaw in the /eris/applicationform.php script, specifically related to the 'picture' argument. This flaw allows an unauthenticated remote attacker to upload arbitrary files without restrictions. Because the vulnerability does not require authentication or user interaction, it can be exploited remotely by simply sending crafted requests to the vulnerable endpoint. The unrestricted upload can lead to several attack vectors, including uploading malicious scripts or web shells, which can then be executed on the server. This can result in unauthorized code execution, data compromise, or complete system takeover. The CVSS 4.0 base score of 6.9 reflects the medium severity, considering the attack vector is network-based, no privileges or user interaction are required, but the impact on confidentiality, integrity, and availability is limited to low. However, the exploit is publicly available, increasing the risk of exploitation. The lack of available patches or mitigation details further elevates the urgency for affected organizations to implement protective measures.

Potential Impact

For European organizations using Campcodes Online Job Finder System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive applicant data, manipulation of job postings, or disruption of recruitment processes. Given that job finder platforms often handle personal identifiable information (PII), including resumes and contact details, a breach could result in GDPR violations with substantial fines and reputational damage. Additionally, attackers could leverage the uploaded malicious files to pivot within the network, potentially compromising other systems. The public availability of the exploit increases the likelihood of opportunistic attacks, especially targeting organizations that have not applied mitigations or updated their systems. The impact on availability could disrupt recruitment operations, affecting business continuity.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /eris/applicationform.php endpoint via network-level controls such as IP whitelisting or VPN access to limit exposure. 2) Implementing web application firewall (WAF) rules to detect and block suspicious file upload attempts, especially those targeting the 'picture' parameter. 3) Enforcing strict validation and sanitization of uploaded files at the application layer, including limiting allowed file types, checking MIME types, and scanning uploads with antivirus solutions. 4) Monitoring server logs for unusual upload activity or execution of unexpected scripts. 5) Isolating the application server to minimize lateral movement if compromise occurs. 6) Planning for an urgent update or patch deployment once available from the vendor. 7) Conducting security awareness training for administrators to recognize signs of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T15:47:13.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c816c046d9c11e5a23765d

Added to database: 9/15/2025, 1:38:08 PM

Last enriched: 9/15/2025, 1:38:49 PM

Last updated: 10/29/2025, 10:43:00 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats