CVE-2025-10784: SQL Injection in Campcodes Online Learning Management System
A security vulnerability has been detected in Campcodes Online Learning Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_subject.php. The manipulation of the argument subject_code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10784 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in the /admin/edit_subject.php file, specifically through the manipulation of the 'subject_code' parameter. This parameter is not properly sanitized or validated, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. The vulnerability enables an attacker to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or deletion. The CVSS 4.0 score of 6.9 classifies this as a medium severity issue, reflecting the ease of exploitation (network attack vector, no privileges or user interaction required) but limited scope and impact on confidentiality, integrity, and availability (each rated low to limited). Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of available patches or mitigations from the vendor further elevates the urgency for organizations using this LMS to implement compensating controls. Given the LMS context, the vulnerability could expose sensitive educational data, user credentials, and institutional information, potentially impacting both students and staff.
Potential Impact
For European organizations, particularly educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive academic and personal data. Exploitation could lead to unauthorized disclosure of student records, grades, and personal information, violating GDPR and other data protection regulations. Integrity violations could result in altered academic records or unauthorized changes to course content, undermining trust in the institution's systems. Although availability impact is limited, successful exploitation could disrupt administrative functions related to course management. The remote and unauthenticated nature of the attack vector means that attackers can target vulnerable systems from anywhere, increasing the threat surface. This is particularly concerning for European organizations that have integrated this LMS into their core educational infrastructure without sufficient security controls or monitoring. The public disclosure of the vulnerability may attract opportunistic attackers, increasing the likelihood of targeted attacks against European educational entities.
Mitigation Recommendations
Since no official patches or vendor advisories are currently available, European organizations should implement immediate compensating controls. These include: 1) Applying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'subject_code' parameter in /admin/edit_subject.php. 2) Conducting thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries, by implementing parameterized queries or prepared statements if possible within the LMS codebase. 3) Restricting network access to the LMS administrative interface to trusted IP addresses or VPNs to reduce exposure. 4) Monitoring logs for unusual database query patterns or repeated failed attempts indicative of injection attempts. 5) Planning for an urgent update or migration to a patched version once available, or considering alternative LMS solutions with better security track records. 6) Educating administrative users about the risks and signs of compromise. 7) Regularly backing up LMS data to enable recovery in case of data integrity attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-10784: SQL Injection in Campcodes Online Learning Management System
Description
A security vulnerability has been detected in Campcodes Online Learning Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_subject.php. The manipulation of the argument subject_code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10784 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in the /admin/edit_subject.php file, specifically through the manipulation of the 'subject_code' parameter. This parameter is not properly sanitized or validated, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. The vulnerability enables an attacker to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or deletion. The CVSS 4.0 score of 6.9 classifies this as a medium severity issue, reflecting the ease of exploitation (network attack vector, no privileges or user interaction required) but limited scope and impact on confidentiality, integrity, and availability (each rated low to limited). Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of available patches or mitigations from the vendor further elevates the urgency for organizations using this LMS to implement compensating controls. Given the LMS context, the vulnerability could expose sensitive educational data, user credentials, and institutional information, potentially impacting both students and staff.
Potential Impact
For European organizations, particularly educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive academic and personal data. Exploitation could lead to unauthorized disclosure of student records, grades, and personal information, violating GDPR and other data protection regulations. Integrity violations could result in altered academic records or unauthorized changes to course content, undermining trust in the institution's systems. Although availability impact is limited, successful exploitation could disrupt administrative functions related to course management. The remote and unauthenticated nature of the attack vector means that attackers can target vulnerable systems from anywhere, increasing the threat surface. This is particularly concerning for European organizations that have integrated this LMS into their core educational infrastructure without sufficient security controls or monitoring. The public disclosure of the vulnerability may attract opportunistic attackers, increasing the likelihood of targeted attacks against European educational entities.
Mitigation Recommendations
Since no official patches or vendor advisories are currently available, European organizations should implement immediate compensating controls. These include: 1) Applying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'subject_code' parameter in /admin/edit_subject.php. 2) Conducting thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries, by implementing parameterized queries or prepared statements if possible within the LMS codebase. 3) Restricting network access to the LMS administrative interface to trusted IP addresses or VPNs to reduce exposure. 4) Monitoring logs for unusual database query patterns or repeated failed attempts indicative of injection attempts. 5) Planning for an urgent update or migration to a patched version once available, or considering alternative LMS solutions with better security track records. 6) Educating administrative users about the risks and signs of compromise. 7) Regularly backing up LMS data to enable recovery in case of data integrity attacks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T08:58:05.147Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d0e13c5eca204502e5181e
Added to database: 9/22/2025, 5:40:12 AM
Last enriched: 9/22/2025, 5:40:42 AM
Last updated: 9/22/2025, 8:16:03 AM
Views: 7
Related Threats
CVE-2025-9035: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Horato Internet Technologies Ind. and Trade Inc. Virtual Library Platform
MediumCVE-2025-10791: SQL Injection in code-projects Online Bidding System
MediumCVE-2025-8079: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Akıllı Ticaret Software Technologies Ltd. Co. Smart Trade E-Commerce
MediumCVE-2025-10790: SQL Injection in SourceCodester Simple Forum Discussion System
MediumCVE-2025-5962: Improper Access Control in Red Hat Red Hat Enterprise Linux 10
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.