CVE-2025-10782: SQL Injection in Campcodes Online Learning Management System
A security flaw has been discovered in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /admin/class.php. Performing manipulation of the argument class_name results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-10782 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The flaw resides in an unspecified function within the /admin/class.php file, where improper sanitization or validation of the 'class_name' parameter allows an attacker to inject malicious SQL code. This vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). Exploiting this flaw could enable an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even deletion. The CVSS 4.0 base score of 6.9 classifies this as a medium severity issue, reflecting a significant risk but with some limitations in impact scope (low confidentiality, integrity, and availability impacts). The vulnerability is publicly known, and although no confirmed exploits in the wild have been reported yet, the public availability of exploit code increases the risk of exploitation. The absence of available patches or mitigation links suggests that users of Campcodes LMS 1.0 must proactively implement defensive measures to reduce exposure. Given the LMS context, the vulnerability could compromise sensitive educational data, user credentials, and institutional records if exploited.
Potential Impact
For European organizations, especially educational institutions, training providers, and corporate learning departments using Campcodes LMS 1.0, this vulnerability poses a tangible threat to data confidentiality and integrity. Exploitation could lead to unauthorized disclosure of student or employee information, manipulation of course content or grades, and disruption of learning services. Such incidents could result in regulatory non-compliance under GDPR due to personal data breaches, reputational damage, and operational downtime. The remote, unauthenticated nature of the attack vector increases the likelihood of exploitation attempts, particularly in environments where the LMS is internet-facing without adequate network segmentation or web application firewalls. Additionally, the lack of patches means organizations must rely on compensating controls, which may not fully mitigate risk. The medium severity rating indicates that while the vulnerability is serious, it may not lead to full system compromise or widespread service outages, but targeted data breaches or localized disruptions remain probable.
Mitigation Recommendations
Organizations should immediately conduct an inventory to identify any deployments of Campcodes LMS version 1.0. In the absence of an official patch, the following specific mitigations are recommended: 1) Implement strict input validation and sanitization on the 'class_name' parameter at the web application firewall (WAF) or reverse proxy level to block SQL injection payloads. 2) Employ parameterized queries or prepared statements if source code access and modification are possible to remediate the root cause. 3) Restrict administrative interface access to trusted IP addresses or via VPN to reduce exposure. 4) Monitor web server and database logs for unusual query patterns or injection attempts targeting 'class_name'. 5) Conduct regular backups of LMS data to enable recovery in case of data tampering. 6) Consider isolating the LMS environment within a segmented network zone with strict egress and ingress filtering. 7) Educate administrators about the vulnerability and encourage prompt reporting of suspicious activity. 8) Engage with the vendor for updates or patches and plan for an upgrade path to a secure LMS version once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-10782: SQL Injection in Campcodes Online Learning Management System
Description
A security flaw has been discovered in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /admin/class.php. Performing manipulation of the argument class_name results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10782 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The flaw resides in an unspecified function within the /admin/class.php file, where improper sanitization or validation of the 'class_name' parameter allows an attacker to inject malicious SQL code. This vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). Exploiting this flaw could enable an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even deletion. The CVSS 4.0 base score of 6.9 classifies this as a medium severity issue, reflecting a significant risk but with some limitations in impact scope (low confidentiality, integrity, and availability impacts). The vulnerability is publicly known, and although no confirmed exploits in the wild have been reported yet, the public availability of exploit code increases the risk of exploitation. The absence of available patches or mitigation links suggests that users of Campcodes LMS 1.0 must proactively implement defensive measures to reduce exposure. Given the LMS context, the vulnerability could compromise sensitive educational data, user credentials, and institutional records if exploited.
Potential Impact
For European organizations, especially educational institutions, training providers, and corporate learning departments using Campcodes LMS 1.0, this vulnerability poses a tangible threat to data confidentiality and integrity. Exploitation could lead to unauthorized disclosure of student or employee information, manipulation of course content or grades, and disruption of learning services. Such incidents could result in regulatory non-compliance under GDPR due to personal data breaches, reputational damage, and operational downtime. The remote, unauthenticated nature of the attack vector increases the likelihood of exploitation attempts, particularly in environments where the LMS is internet-facing without adequate network segmentation or web application firewalls. Additionally, the lack of patches means organizations must rely on compensating controls, which may not fully mitigate risk. The medium severity rating indicates that while the vulnerability is serious, it may not lead to full system compromise or widespread service outages, but targeted data breaches or localized disruptions remain probable.
Mitigation Recommendations
Organizations should immediately conduct an inventory to identify any deployments of Campcodes LMS version 1.0. In the absence of an official patch, the following specific mitigations are recommended: 1) Implement strict input validation and sanitization on the 'class_name' parameter at the web application firewall (WAF) or reverse proxy level to block SQL injection payloads. 2) Employ parameterized queries or prepared statements if source code access and modification are possible to remediate the root cause. 3) Restrict administrative interface access to trusted IP addresses or via VPN to reduce exposure. 4) Monitor web server and database logs for unusual query patterns or injection attempts targeting 'class_name'. 5) Conduct regular backups of LMS data to enable recovery in case of data tampering. 6) Consider isolating the LMS environment within a segmented network zone with strict egress and ingress filtering. 7) Educate administrators about the vulnerability and encourage prompt reporting of suspicious activity. 8) Engage with the vendor for updates or patches and plan for an upgrade path to a secure LMS version once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T08:57:59.776Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d0d22a2292bf50abde952e
Added to database: 9/22/2025, 4:35:54 AM
Last enriched: 9/22/2025, 4:36:23 AM
Last updated: 9/22/2025, 7:36:46 AM
Views: 5
Related Threats
CVE-2025-10791: SQL Injection in code-projects Online Bidding System
MediumCVE-2025-8079: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Akıllı Ticaret Software Technologies Ltd. Co. Smart Trade E-Commerce
MediumCVE-2025-10790: SQL Injection in SourceCodester Simple Forum Discussion System
MediumCVE-2025-5962: Improper Access Control in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-10789: SQL Injection in SourceCodester Online Hotel Reservation System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.