CVE-2025-10781: SQL Injection in Campcodes Online Learning Management System
A vulnerability was identified in Campcodes Online Learning Management System 1.0. This impacts an unknown function of the file /admin/edit_class.php. Such manipulation of the argument class_name leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-10781 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in the /admin/edit_class.php file, specifically in the handling of the 'class_name' parameter. Improper sanitization or validation of this input allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This can lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data stored within the LMS. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is rated as low individually but collectively significant enough to warrant concern. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the Campcodes LMS, which is used primarily in educational environments to manage courses, classes, and student information. Given the administrative context of the vulnerable script, successful exploitation could compromise administrative data and potentially allow further lateral movement within the affected environment.
Potential Impact
For European organizations, particularly educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a risk of unauthorized data exposure and manipulation. Attackers exploiting this flaw could access sensitive student records, course materials, and administrative configurations, potentially leading to data breaches and disruption of educational services. The compromise of LMS data integrity could undermine trust in the institution’s ability to secure personal information, leading to reputational damage and regulatory consequences under GDPR. Additionally, attackers might leverage this vulnerability as an initial foothold to escalate privileges or deploy further attacks within the network. The remote and unauthenticated nature of the exploit increases the threat surface, especially for institutions with externally accessible LMS portals. The medium severity rating suggests that while the impact is not catastrophic, the potential for data leakage and service disruption is significant enough to require prompt remediation.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should verify if Campcodes has released patches or updates addressing this vulnerability and apply them promptly. If no official patch exists, consider disabling or restricting access to the /admin/edit_class.php functionality until a fix is available. 2. Input validation and sanitization: Implement strong input validation on the 'class_name' parameter to ensure only expected values are accepted, using parameterized queries or prepared statements to prevent SQL injection. 3. Network segmentation and access controls: Restrict administrative interface access to trusted internal networks or VPNs to reduce exposure to external attackers. 4. Web application firewall (WAF): Deploy and configure a WAF with rules to detect and block SQL injection attempts targeting the vulnerable parameter. 5. Monitoring and logging: Enable detailed logging of web application requests and database queries to detect suspicious activity related to SQL injection attempts. 6. Incident response readiness: Prepare to respond to potential exploitation by having backups of LMS data and a plan to restore services quickly if compromised. 7. Vendor engagement: Maintain communication with Campcodes for updates and security advisories related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10781: SQL Injection in Campcodes Online Learning Management System
Description
A vulnerability was identified in Campcodes Online Learning Management System 1.0. This impacts an unknown function of the file /admin/edit_class.php. Such manipulation of the argument class_name leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10781 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in the /admin/edit_class.php file, specifically in the handling of the 'class_name' parameter. Improper sanitization or validation of this input allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This can lead to unauthorized access to the underlying database, enabling attackers to read, modify, or delete sensitive data stored within the LMS. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is rated as low individually but collectively significant enough to warrant concern. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the Campcodes LMS, which is used primarily in educational environments to manage courses, classes, and student information. Given the administrative context of the vulnerable script, successful exploitation could compromise administrative data and potentially allow further lateral movement within the affected environment.
Potential Impact
For European organizations, particularly educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a risk of unauthorized data exposure and manipulation. Attackers exploiting this flaw could access sensitive student records, course materials, and administrative configurations, potentially leading to data breaches and disruption of educational services. The compromise of LMS data integrity could undermine trust in the institution’s ability to secure personal information, leading to reputational damage and regulatory consequences under GDPR. Additionally, attackers might leverage this vulnerability as an initial foothold to escalate privileges or deploy further attacks within the network. The remote and unauthenticated nature of the exploit increases the threat surface, especially for institutions with externally accessible LMS portals. The medium severity rating suggests that while the impact is not catastrophic, the potential for data leakage and service disruption is significant enough to require prompt remediation.
Mitigation Recommendations
1. Immediate upgrade or patching: Organizations should verify if Campcodes has released patches or updates addressing this vulnerability and apply them promptly. If no official patch exists, consider disabling or restricting access to the /admin/edit_class.php functionality until a fix is available. 2. Input validation and sanitization: Implement strong input validation on the 'class_name' parameter to ensure only expected values are accepted, using parameterized queries or prepared statements to prevent SQL injection. 3. Network segmentation and access controls: Restrict administrative interface access to trusted internal networks or VPNs to reduce exposure to external attackers. 4. Web application firewall (WAF): Deploy and configure a WAF with rules to detect and block SQL injection attempts targeting the vulnerable parameter. 5. Monitoring and logging: Enable detailed logging of web application requests and database queries to detect suspicious activity related to SQL injection attempts. 6. Incident response readiness: Prepare to respond to potential exploitation by having backups of LMS data and a plan to restore services quickly if compromised. 7. Vendor engagement: Maintain communication with Campcodes for updates and security advisories related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T08:57:57.228Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d0caaeabfd0dcecbef9f85
Added to database: 9/22/2025, 4:03:58 AM
Last enriched: 9/22/2025, 4:04:26 AM
Last updated: 9/22/2025, 5:16:22 AM
Views: 4
Related Threats
CVE-2025-10786: SQL Injection in Campcodes Grocery Sales and Inventory System
MediumCVE-2025-10784: SQL Injection in Campcodes Online Learning Management System
MediumThe God Mode Vulnerability That Should Kill “Trust Microsoft” Forever
MediumCVE-2025-10782: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-59798: CWE-121 Stack-based Buffer Overflow in Artifex Ghostscript
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.