Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10810: SQL Injection in Campcodes Online Learning Management System

0
Medium
VulnerabilityCVE-2025-10810cvecve-2025-10810
Published: Mon Sep 22 2025 (09/22/2025, 18:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Learning Management System

Description

A vulnerability was detected in Campcodes Online Learning Management System 1.0. The impacted element is an unknown function of the file /admin/edit_user.php. Performing manipulation of the argument firstname results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/22/2025, 19:00:56 UTC

Technical Analysis

CVE-2025-10810 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability resides in the /admin/edit_user.php file, specifically involving the manipulation of the 'firstname' argument. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by injecting malicious SQL code through the firstname parameter. This injection can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete sensitive data stored within the LMS. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The vector details show that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The scope remains unchanged (S:U), and the exploit code has been publicly disclosed, increasing the risk of exploitation. Although no known exploits in the wild have been reported yet, the public availability of the exploit code raises the likelihood of future attacks. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate mitigation measures. Given that the vulnerability affects an administrative function, successful exploitation could compromise user data and administrative controls within the LMS environment.

Potential Impact

For European organizations using Campcodes Online Learning Management System 1.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their educational data and user information. Exploitation could lead to unauthorized disclosure of personal data of students and staff, manipulation or deletion of records, and potential disruption of LMS services. This can undermine trust in the educational institution's digital infrastructure and may lead to regulatory non-compliance, especially under GDPR, which mandates strict protection of personal data. Additionally, compromised LMS platforms could be leveraged as entry points for broader network intrusions, potentially affecting other connected systems. The impact is particularly critical for institutions that rely heavily on this LMS for remote learning, as service disruption could affect educational continuity. The medium severity rating reflects the partial impact and ease of exploitation, but the absence of required authentication and user interaction increases the threat level for organizations that have not applied mitigations.

Mitigation Recommendations

Immediate mitigation steps should include restricting access to the /admin/edit_user.php endpoint to trusted IP addresses or VPN users to limit exposure. Implementing Web Application Firewalls (WAF) with specific rules to detect and block SQL injection patterns targeting the firstname parameter can provide a protective layer. Organizations should conduct thorough input validation and sanitization on all user-supplied data, especially in administrative modules. Until an official patch is released, consider disabling or restricting the vulnerable functionality if feasible. Regularly monitor logs for suspicious activities related to the edit_user.php script. Additionally, organizations should prepare incident response plans to quickly address potential exploitation attempts. Engaging with the vendor to obtain timely patches and updates is critical. Finally, conducting security awareness training for administrators on recognizing and reporting unusual system behavior can enhance early detection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T10:09:45.197Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d197d505d26ef41525082f

Added to database: 9/22/2025, 6:39:17 PM

Last enriched: 9/22/2025, 7:00:56 PM

Last updated: 10/7/2025, 1:50:38 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats