CVE-2025-10447: Unrestricted Upload in Campcodes Online Job Finder System
A vulnerability was detected in Campcodes Online Job Finder System 1.0. The impacted element is an unknown function of the file /eris/applicationform.php. The manipulation of the argument picture results in unrestricted upload. It is possible to launch the attack remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-10447 is a medium-severity vulnerability affecting Campcodes Online Job Finder System version 1.0. The vulnerability arises from an unrestricted file upload flaw in the /eris/applicationform.php script, specifically related to the 'picture' argument. This flaw allows an unauthenticated remote attacker to upload arbitrary files without restrictions. Because the vulnerability does not require authentication or user interaction, it can be exploited remotely by simply sending crafted requests to the vulnerable endpoint. The unrestricted upload can lead to several attack vectors, including uploading malicious scripts or web shells, which can then be executed on the server. This can result in unauthorized code execution, data compromise, or complete system takeover. The CVSS 4.0 base score of 6.9 reflects the medium severity, considering the attack vector is network-based, no privileges or user interaction are required, but the impact on confidentiality, integrity, and availability is limited to low. However, the exploit is publicly available, increasing the risk of exploitation. The lack of available patches or mitigation details further elevates the urgency for affected organizations to implement protective measures.
Potential Impact
For European organizations using Campcodes Online Job Finder System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive applicant data, manipulation of job postings, or disruption of recruitment processes. Given that job finder platforms often handle personal identifiable information (PII), including resumes and contact details, a breach could result in GDPR violations with substantial fines and reputational damage. Additionally, attackers could leverage the uploaded malicious files to pivot within the network, potentially compromising other systems. The public availability of the exploit increases the likelihood of opportunistic attacks, especially targeting organizations that have not applied mitigations or updated their systems. The impact on availability could disrupt recruitment operations, affecting business continuity.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /eris/applicationform.php endpoint via network-level controls such as IP whitelisting or VPN access to limit exposure. 2) Implementing web application firewall (WAF) rules to detect and block suspicious file upload attempts, especially those targeting the 'picture' parameter. 3) Enforcing strict validation and sanitization of uploaded files at the application layer, including limiting allowed file types, checking MIME types, and scanning uploads with antivirus solutions. 4) Monitoring server logs for unusual upload activity or execution of unexpected scripts. 5) Isolating the application server to minimize lateral movement if compromise occurs. 6) Planning for an urgent update or patch deployment once available from the vendor. 7) Conducting security awareness training for administrators to recognize signs of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10447: Unrestricted Upload in Campcodes Online Job Finder System
Description
A vulnerability was detected in Campcodes Online Job Finder System 1.0. The impacted element is an unknown function of the file /eris/applicationform.php. The manipulation of the argument picture results in unrestricted upload. It is possible to launch the attack remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10447 is a medium-severity vulnerability affecting Campcodes Online Job Finder System version 1.0. The vulnerability arises from an unrestricted file upload flaw in the /eris/applicationform.php script, specifically related to the 'picture' argument. This flaw allows an unauthenticated remote attacker to upload arbitrary files without restrictions. Because the vulnerability does not require authentication or user interaction, it can be exploited remotely by simply sending crafted requests to the vulnerable endpoint. The unrestricted upload can lead to several attack vectors, including uploading malicious scripts or web shells, which can then be executed on the server. This can result in unauthorized code execution, data compromise, or complete system takeover. The CVSS 4.0 base score of 6.9 reflects the medium severity, considering the attack vector is network-based, no privileges or user interaction are required, but the impact on confidentiality, integrity, and availability is limited to low. However, the exploit is publicly available, increasing the risk of exploitation. The lack of available patches or mitigation details further elevates the urgency for affected organizations to implement protective measures.
Potential Impact
For European organizations using Campcodes Online Job Finder System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive applicant data, manipulation of job postings, or disruption of recruitment processes. Given that job finder platforms often handle personal identifiable information (PII), including resumes and contact details, a breach could result in GDPR violations with substantial fines and reputational damage. Additionally, attackers could leverage the uploaded malicious files to pivot within the network, potentially compromising other systems. The public availability of the exploit increases the likelihood of opportunistic attacks, especially targeting organizations that have not applied mitigations or updated their systems. The impact on availability could disrupt recruitment operations, affecting business continuity.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /eris/applicationform.php endpoint via network-level controls such as IP whitelisting or VPN access to limit exposure. 2) Implementing web application firewall (WAF) rules to detect and block suspicious file upload attempts, especially those targeting the 'picture' parameter. 3) Enforcing strict validation and sanitization of uploaded files at the application layer, including limiting allowed file types, checking MIME types, and scanning uploads with antivirus solutions. 4) Monitoring server logs for unusual upload activity or execution of unexpected scripts. 5) Isolating the application server to minimize lateral movement if compromise occurs. 6) Planning for an urgent update or patch deployment once available from the vendor. 7) Conducting security awareness training for administrators to recognize signs of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-14T15:47:13.358Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c816c046d9c11e5a23765d
Added to database: 9/15/2025, 1:38:08 PM
Last enriched: 9/15/2025, 1:38:49 PM
Last updated: 9/15/2025, 1:38:49 PM
Views: 1
Related Threats
CVE-2025-59376: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in feiskyer mcp-kubernetes-server
LowCVE-2025-10446: SQL Injection in Campcodes Computer Sales and Inventory System
MediumCVE-2025-3025: CWE-552 Files or Directories Accessible to External Parties in Gen Digital CCleaner
HighCVE-2025-10445: SQL Injection in Campcodes Computer Sales and Inventory System
MediumCVE-2025-59358: CWE-306 Missing Authentication for Critical Function
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.