Skip to main content

CVE-2025-10825: SQL Injection in Campcodes Online Beauty Parlor Management System

Medium
VulnerabilityCVE-2025-10825cvecve-2025-10825
Published: Tue Sep 23 2025 (09/23/2025, 00:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Beauty Parlor Management System

Description

A vulnerability was identified in Campcodes Online Beauty Parlor Management System 1.0. Affected is an unknown function of the file /admin/view-appointment.php. The manipulation of the argument viewid leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 09/23/2025, 01:04:38 UTC

Technical Analysis

CVE-2025-10825 is a medium severity SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Beauty Parlor Management System. The vulnerability exists in the /admin/view-appointment.php file, specifically in the handling of the 'viewid' parameter. An attacker can remotely manipulate this parameter without authentication or user interaction to inject malicious SQL code. This injection can lead to unauthorized access or modification of the backend database, potentially exposing sensitive appointment and customer data or allowing further compromise of the system. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a network attack vector with low complexity and no privileges required, but with limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a niche management system tailored for beauty parlors, likely deployed in small to medium-sized businesses managing appointments and client information.

Potential Impact

For European organizations using the Campcodes Online Beauty Parlor Management System 1.0, this vulnerability poses a risk of unauthorized data disclosure and potential data integrity violations. Given the nature of the system, customer personal data, appointment schedules, and possibly payment information could be exposed or altered. This could lead to privacy violations under GDPR, reputational damage, and operational disruptions. While the impact on availability is limited, the breach of confidentiality and integrity could have regulatory and financial consequences. Small and medium enterprises in the beauty and wellness sector across Europe, which may have less mature cybersecurity defenses, are particularly vulnerable. The remote exploitability without authentication increases the risk of automated attacks targeting exposed management interfaces.

Mitigation Recommendations

Specific mitigation steps include: 1) Immediate upgrade or patching of the Campcodes Online Beauty Parlor Management System to a version where this vulnerability is fixed; if no patch is available, consider disabling or restricting access to the /admin/view-appointment.php endpoint. 2) Implement strict input validation and parameterized queries or prepared statements in the codebase to prevent SQL injection. 3) Restrict administrative interface access via network controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted users only. 4) Monitor web server logs for suspicious requests targeting the 'viewid' parameter to detect exploitation attempts. 5) Conduct security audits and penetration testing focusing on SQL injection vectors in all web-facing applications. 6) Educate staff on the importance of timely updates and secure configuration management. 7) If possible, isolate the management system database with least privilege principles to limit damage in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T16:11:48.205Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d1ee8defb46fd030578109

Added to database: 9/23/2025, 12:49:17 AM

Last enriched: 9/23/2025, 1:04:38 AM

Last updated: 9/25/2025, 12:08:24 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats