CVE-2025-10563: SQL Injection in Campcodes Grocery Sales and Inventory System
A vulnerability has been found in Campcodes Grocery Sales and Inventory System 1.0. This impacts an unknown function of the file /ajax.php?action=save_category. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-10563 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Grocery Sales and Inventory System, specifically within the /ajax.php endpoint when invoked with the action parameter set to save_category. The vulnerability arises from improper sanitization or validation of the 'ID' argument, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited by sending crafted requests to the vulnerable endpoint, potentially enabling unauthorized access to the backend database. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt inventory and sales operations, impacting business continuity and data integrity. The lack of a patch or mitigation guidance from the vendor at this time heightens the urgency for organizations using this software to implement compensating controls.
Potential Impact
For European organizations using Campcodes Grocery Sales and Inventory System 1.0, this vulnerability poses a tangible risk to the confidentiality and integrity of their sales and inventory data. Exploitation could lead to unauthorized data disclosure, manipulation of inventory records, or disruption of sales processes, potentially causing financial losses, regulatory non-compliance (e.g., GDPR violations if personal data is involved), and reputational damage. Retailers and grocery chains relying on this system may experience operational downtime or incorrect stock management, affecting supply chain efficiency. Given the remote and unauthenticated nature of the attack, threat actors could exploit this vulnerability at scale, especially targeting organizations with internet-facing instances of the affected system. The medium severity rating suggests a moderate but significant threat that should not be ignored, particularly in sectors where data accuracy and availability are critical.
Mitigation Recommendations
Since no official patch or vendor guidance is currently available, European organizations should take immediate steps to mitigate risk. These include: 1) Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting /ajax.php?action=save_category and the ID parameter. 2) Restricting access to the vulnerable endpoint by IP whitelisting or VPN-only access to reduce exposure. 3) Conducting thorough input validation and sanitization at the application or proxy level if possible. 4) Monitoring logs for unusual or suspicious requests targeting the vulnerable endpoint to detect exploitation attempts early. 5) Segregating the database with least privilege principles to limit the impact of a successful injection. 6) Planning and prioritizing an upgrade or patch deployment once the vendor releases a fix. 7) Educating IT and security teams about this vulnerability to ensure rapid incident response if exploitation is detected.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-10563: SQL Injection in Campcodes Grocery Sales and Inventory System
Description
A vulnerability has been found in Campcodes Grocery Sales and Inventory System 1.0. This impacts an unknown function of the file /ajax.php?action=save_category. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10563 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Grocery Sales and Inventory System, specifically within the /ajax.php endpoint when invoked with the action parameter set to save_category. The vulnerability arises from improper sanitization or validation of the 'ID' argument, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited by sending crafted requests to the vulnerable endpoint, potentially enabling unauthorized access to the backend database. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt inventory and sales operations, impacting business continuity and data integrity. The lack of a patch or mitigation guidance from the vendor at this time heightens the urgency for organizations using this software to implement compensating controls.
Potential Impact
For European organizations using Campcodes Grocery Sales and Inventory System 1.0, this vulnerability poses a tangible risk to the confidentiality and integrity of their sales and inventory data. Exploitation could lead to unauthorized data disclosure, manipulation of inventory records, or disruption of sales processes, potentially causing financial losses, regulatory non-compliance (e.g., GDPR violations if personal data is involved), and reputational damage. Retailers and grocery chains relying on this system may experience operational downtime or incorrect stock management, affecting supply chain efficiency. Given the remote and unauthenticated nature of the attack, threat actors could exploit this vulnerability at scale, especially targeting organizations with internet-facing instances of the affected system. The medium severity rating suggests a moderate but significant threat that should not be ignored, particularly in sectors where data accuracy and availability are critical.
Mitigation Recommendations
Since no official patch or vendor guidance is currently available, European organizations should take immediate steps to mitigate risk. These include: 1) Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting /ajax.php?action=save_category and the ID parameter. 2) Restricting access to the vulnerable endpoint by IP whitelisting or VPN-only access to reduce exposure. 3) Conducting thorough input validation and sanitization at the application or proxy level if possible. 4) Monitoring logs for unusual or suspicious requests targeting the vulnerable endpoint to detect exploitation attempts early. 5) Segregating the database with least privilege principles to limit the impact of a successful injection. 6) Planning and prioritizing an upgrade or patch deployment once the vendor releases a fix. 7) Educating IT and security teams about this vulnerability to ensure rapid incident response if exploitation is detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-16T14:13:03.997Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c9c2d13e74084d506c7f39
Added to database: 9/16/2025, 8:04:33 PM
Last enriched: 9/16/2025, 8:04:47 PM
Last updated: 9/18/2025, 8:01:18 PM
Views: 14
Related Threats
CVE-2025-10035: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Fortra GoAnywhere MFT
CriticalCVE-2025-59220: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2022
HighCVE-2025-59216: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2025 (Server Core installation)
HighCVE-2025-59215: CWE-416: Use After Free in Microsoft Windows Server 2025 (Server Core installation)
HighCVE-2025-54754: CWE-259 in Cognex In-Sight 2000 series
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.