CVE-2025-10810: SQL Injection in Campcodes Online Learning Management System
A vulnerability was detected in Campcodes Online Learning Management System 1.0. The impacted element is an unknown function of the file /admin/edit_user.php. Performing manipulation of the argument firstname results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-10810 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability resides in the /admin/edit_user.php file, specifically involving the manipulation of the 'firstname' argument. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by injecting malicious SQL code through the firstname parameter. This injection can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete sensitive data stored within the LMS. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The vector details show that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The scope remains unchanged (S:U), and the exploit code has been publicly disclosed, increasing the risk of exploitation. Although no known exploits in the wild have been reported yet, the public availability of the exploit code raises the likelihood of future attacks. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate mitigation measures. Given that the vulnerability affects an administrative function, successful exploitation could compromise user data and administrative controls within the LMS environment.
Potential Impact
For European organizations using Campcodes Online Learning Management System 1.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their educational data and user information. Exploitation could lead to unauthorized disclosure of personal data of students and staff, manipulation or deletion of records, and potential disruption of LMS services. This can undermine trust in the educational institution's digital infrastructure and may lead to regulatory non-compliance, especially under GDPR, which mandates strict protection of personal data. Additionally, compromised LMS platforms could be leveraged as entry points for broader network intrusions, potentially affecting other connected systems. The impact is particularly critical for institutions that rely heavily on this LMS for remote learning, as service disruption could affect educational continuity. The medium severity rating reflects the partial impact and ease of exploitation, but the absence of required authentication and user interaction increases the threat level for organizations that have not applied mitigations.
Mitigation Recommendations
Immediate mitigation steps should include restricting access to the /admin/edit_user.php endpoint to trusted IP addresses or VPN users to limit exposure. Implementing Web Application Firewalls (WAF) with specific rules to detect and block SQL injection patterns targeting the firstname parameter can provide a protective layer. Organizations should conduct thorough input validation and sanitization on all user-supplied data, especially in administrative modules. Until an official patch is released, consider disabling or restricting the vulnerable functionality if feasible. Regularly monitor logs for suspicious activities related to the edit_user.php script. Additionally, organizations should prepare incident response plans to quickly address potential exploitation attempts. Engaging with the vendor to obtain timely patches and updates is critical. Finally, conducting security awareness training for administrators on recognizing and reporting unusual system behavior can enhance early detection.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-10810: SQL Injection in Campcodes Online Learning Management System
Description
A vulnerability was detected in Campcodes Online Learning Management System 1.0. The impacted element is an unknown function of the file /admin/edit_user.php. Performing manipulation of the argument firstname results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10810 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability resides in the /admin/edit_user.php file, specifically involving the manipulation of the 'firstname' argument. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by injecting malicious SQL code through the firstname parameter. This injection can lead to unauthorized access to the backend database, allowing attackers to read, modify, or delete sensitive data stored within the LMS. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The vector details show that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The scope remains unchanged (S:U), and the exploit code has been publicly disclosed, increasing the risk of exploitation. Although no known exploits in the wild have been reported yet, the public availability of the exploit code raises the likelihood of future attacks. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate mitigation measures. Given that the vulnerability affects an administrative function, successful exploitation could compromise user data and administrative controls within the LMS environment.
Potential Impact
For European organizations using Campcodes Online Learning Management System 1.0, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their educational data and user information. Exploitation could lead to unauthorized disclosure of personal data of students and staff, manipulation or deletion of records, and potential disruption of LMS services. This can undermine trust in the educational institution's digital infrastructure and may lead to regulatory non-compliance, especially under GDPR, which mandates strict protection of personal data. Additionally, compromised LMS platforms could be leveraged as entry points for broader network intrusions, potentially affecting other connected systems. The impact is particularly critical for institutions that rely heavily on this LMS for remote learning, as service disruption could affect educational continuity. The medium severity rating reflects the partial impact and ease of exploitation, but the absence of required authentication and user interaction increases the threat level for organizations that have not applied mitigations.
Mitigation Recommendations
Immediate mitigation steps should include restricting access to the /admin/edit_user.php endpoint to trusted IP addresses or VPN users to limit exposure. Implementing Web Application Firewalls (WAF) with specific rules to detect and block SQL injection patterns targeting the firstname parameter can provide a protective layer. Organizations should conduct thorough input validation and sanitization on all user-supplied data, especially in administrative modules. Until an official patch is released, consider disabling or restricting the vulnerable functionality if feasible. Regularly monitor logs for suspicious activities related to the edit_user.php script. Additionally, organizations should prepare incident response plans to quickly address potential exploitation attempts. Engaging with the vendor to obtain timely patches and updates is critical. Finally, conducting security awareness training for administrators on recognizing and reporting unusual system behavior can enhance early detection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T10:09:45.197Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d197d505d26ef41525082f
Added to database: 9/22/2025, 6:39:17 PM
Last enriched: 9/22/2025, 7:00:56 PM
Last updated: 10/7/2025, 1:50:38 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.