Skip to main content

CVE-2025-10447: Unrestricted Upload in Campcodes Online Job Finder System

Medium
VulnerabilityCVE-2025-10447cvecve-2025-10447
Published: Mon Sep 15 2025 (09/15/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Job Finder System

Description

A vulnerability was detected in Campcodes Online Job Finder System 1.0. The impacted element is an unknown function of the file /eris/applicationform.php. The manipulation of the argument picture results in unrestricted upload. It is possible to launch the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/15/2025, 13:38:49 UTC

Technical Analysis

CVE-2025-10447 is a medium-severity vulnerability affecting Campcodes Online Job Finder System version 1.0. The vulnerability arises from an unrestricted file upload flaw in the /eris/applicationform.php script, specifically related to the 'picture' argument. This flaw allows an unauthenticated remote attacker to upload arbitrary files without restrictions. Because the vulnerability does not require authentication or user interaction, it can be exploited remotely by simply sending crafted requests to the vulnerable endpoint. The unrestricted upload can lead to several attack vectors, including uploading malicious scripts or web shells, which can then be executed on the server. This can result in unauthorized code execution, data compromise, or complete system takeover. The CVSS 4.0 base score of 6.9 reflects the medium severity, considering the attack vector is network-based, no privileges or user interaction are required, but the impact on confidentiality, integrity, and availability is limited to low. However, the exploit is publicly available, increasing the risk of exploitation. The lack of available patches or mitigation details further elevates the urgency for affected organizations to implement protective measures.

Potential Impact

For European organizations using Campcodes Online Job Finder System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive applicant data, manipulation of job postings, or disruption of recruitment processes. Given that job finder platforms often handle personal identifiable information (PII), including resumes and contact details, a breach could result in GDPR violations with substantial fines and reputational damage. Additionally, attackers could leverage the uploaded malicious files to pivot within the network, potentially compromising other systems. The public availability of the exploit increases the likelihood of opportunistic attacks, especially targeting organizations that have not applied mitigations or updated their systems. The impact on availability could disrupt recruitment operations, affecting business continuity.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /eris/applicationform.php endpoint via network-level controls such as IP whitelisting or VPN access to limit exposure. 2) Implementing web application firewall (WAF) rules to detect and block suspicious file upload attempts, especially those targeting the 'picture' parameter. 3) Enforcing strict validation and sanitization of uploaded files at the application layer, including limiting allowed file types, checking MIME types, and scanning uploads with antivirus solutions. 4) Monitoring server logs for unusual upload activity or execution of unexpected scripts. 5) Isolating the application server to minimize lateral movement if compromise occurs. 6) Planning for an urgent update or patch deployment once available from the vendor. 7) Conducting security awareness training for administrators to recognize signs of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T15:47:13.358Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c816c046d9c11e5a23765d

Added to database: 9/15/2025, 1:38:08 PM

Last enriched: 9/15/2025, 1:38:49 PM

Last updated: 9/15/2025, 1:38:49 PM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats