Skip to main content

CVE-2025-10786: SQL Injection in Campcodes Grocery Sales and Inventory System

Medium
VulnerabilityCVE-2025-10786cvecve-2025-10786
Published: Mon Sep 22 2025 (09/22/2025, 06:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Grocery Sales and Inventory System

Description

A flaw has been found in Campcodes Grocery Sales and Inventory System 1.0. This vulnerability affects unknown code of the file /ajax.php?action=delete_user. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/22/2025, 06:38:18 UTC

Technical Analysis

CVE-2025-10786 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Grocery Sales and Inventory System. The vulnerability resides in the /ajax.php endpoint, specifically when the action parameter is set to delete_user and the ID argument is manipulated. This allows an unauthenticated remote attacker to inject malicious SQL code due to insufficient input validation or sanitization of the ID parameter. Exploiting this flaw could enable the attacker to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, modification, or deletion. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the existence of a published exploit increases the risk of exploitation. The affected product is a specialized grocery sales and inventory management system, which likely manages sensitive business and customer data, including inventory records, sales transactions, and user accounts. The vulnerability's exploitation could disrupt business operations, cause financial losses, and expose sensitive data to attackers.

Potential Impact

For European organizations using the Campcodes Grocery Sales and Inventory System 1.0, this vulnerability poses a significant risk to operational continuity and data security. Successful exploitation could lead to unauthorized disclosure of sensitive business information such as sales data, inventory levels, and user credentials. Data integrity could be compromised by unauthorized modification or deletion of records, potentially causing inventory mismanagement and financial discrepancies. Availability impacts could arise if attackers manipulate or delete critical data, disrupting sales and inventory processes. Given the remote and unauthenticated nature of the exploit, attackers could leverage this vulnerability to gain a foothold within the affected organization's network, potentially leading to further lateral movement or data exfiltration. European grocery retailers and suppliers relying on this system may face regulatory compliance issues under GDPR if customer or employee data is exposed. The medium severity rating suggests a moderate but tangible threat that requires timely remediation to prevent exploitation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately apply any available patches or updates from Campcodes once released. In the absence of official patches, organizations should implement input validation and sanitization controls at the web application firewall (WAF) or reverse proxy level to block malicious SQL injection payloads targeting the /ajax.php?action=delete_user endpoint. Restricting access to the affected endpoint through network segmentation or IP whitelisting can reduce exposure. Monitoring web server logs and database activity for unusual queries or repeated access attempts to the vulnerable parameter can help detect exploitation attempts early. Additionally, organizations should conduct a thorough security review of the application code to identify and remediate other potential injection points. Regular backups of critical data should be maintained to enable recovery in case of data tampering or deletion. Finally, educating staff about the risks of SQL injection and enforcing secure coding practices for future development can prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T09:00:50.021Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d0eebb55c5efc64e8347e3

Added to database: 9/22/2025, 6:37:47 AM

Last enriched: 9/22/2025, 6:38:18 AM

Last updated: 9/22/2025, 7:55:10 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats