CVE-2025-10826: SQL Injection in Campcodes Online Beauty Parlor Management System
A security flaw has been discovered in Campcodes Online Beauty Parlor Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/sales-reports-detail.php. The manipulation of the argument fromdate/todate results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-10826 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Beauty Parlor Management System. The flaw exists in the /admin/sales-reports-detail.php file, specifically in the handling of the 'fromdate' and 'todate' parameters. These parameters are used to filter sales reports by date, but due to insufficient input validation or sanitization, an attacker can inject malicious SQL code. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The attack complexity is low, and the vulnerability affects confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L). Although the exploit has been publicly released, there are no confirmed reports of active exploitation in the wild. The vulnerability allows an attacker to manipulate database queries, potentially leading to unauthorized data access, data modification, or denial of service by corrupting or deleting data. The scope is limited to the affected version 1.0 of the product, and no patch or mitigation has been officially published yet.
Potential Impact
For European organizations using the Campcodes Online Beauty Parlor Management System version 1.0, this vulnerability poses a risk of unauthorized access to sensitive business data such as sales reports and customer information. Exploitation could lead to data breaches, loss of data integrity, and disruption of business operations. Given the nature of the product, which is likely used by small to medium-sized beauty salons and related businesses, the impact could include financial loss, reputational damage, and regulatory compliance issues under GDPR if personal data is exposed. The remote exploitability without authentication increases the risk profile, especially for organizations with internet-facing administrative interfaces. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still requires prompt attention to prevent potential exploitation.
Mitigation Recommendations
Organizations should immediately review and restrict access to the /admin/sales-reports-detail.php endpoint, ideally limiting it to trusted internal networks or VPN access. Input validation and parameter sanitization should be implemented to prevent SQL injection, including the use of prepared statements or parameterized queries in the affected code. Since no official patch is currently available, applying Web Application Firewall (WAF) rules to detect and block SQL injection attempts targeting the 'fromdate' and 'todate' parameters is recommended. Regular monitoring of logs for suspicious activity related to these parameters should be established. Additionally, organizations should consider upgrading to a newer, patched version of the software once available or contacting the vendor for guidance. Backup procedures should be verified to ensure data recovery in case of an attack.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-10826: SQL Injection in Campcodes Online Beauty Parlor Management System
Description
A security flaw has been discovered in Campcodes Online Beauty Parlor Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/sales-reports-detail.php. The manipulation of the argument fromdate/todate results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10826 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Beauty Parlor Management System. The flaw exists in the /admin/sales-reports-detail.php file, specifically in the handling of the 'fromdate' and 'todate' parameters. These parameters are used to filter sales reports by date, but due to insufficient input validation or sanitization, an attacker can inject malicious SQL code. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The attack complexity is low, and the vulnerability affects confidentiality, integrity, and availability to a limited extent (VC:L/VI:L/VA:L). Although the exploit has been publicly released, there are no confirmed reports of active exploitation in the wild. The vulnerability allows an attacker to manipulate database queries, potentially leading to unauthorized data access, data modification, or denial of service by corrupting or deleting data. The scope is limited to the affected version 1.0 of the product, and no patch or mitigation has been officially published yet.
Potential Impact
For European organizations using the Campcodes Online Beauty Parlor Management System version 1.0, this vulnerability poses a risk of unauthorized access to sensitive business data such as sales reports and customer information. Exploitation could lead to data breaches, loss of data integrity, and disruption of business operations. Given the nature of the product, which is likely used by small to medium-sized beauty salons and related businesses, the impact could include financial loss, reputational damage, and regulatory compliance issues under GDPR if personal data is exposed. The remote exploitability without authentication increases the risk profile, especially for organizations with internet-facing administrative interfaces. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still requires prompt attention to prevent potential exploitation.
Mitigation Recommendations
Organizations should immediately review and restrict access to the /admin/sales-reports-detail.php endpoint, ideally limiting it to trusted internal networks or VPN access. Input validation and parameter sanitization should be implemented to prevent SQL injection, including the use of prepared statements or parameterized queries in the affected code. Since no official patch is currently available, applying Web Application Firewall (WAF) rules to detect and block SQL injection attempts targeting the 'fromdate' and 'todate' parameters is recommended. Regular monitoring of logs for suspicious activity related to these parameters should be established. Additionally, organizations should consider upgrading to a newer, patched version of the software once available or contacting the vendor for guidance. Backup procedures should be verified to ensure data recovery in case of an attack.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T16:11:50.576Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d1ee8defb46fd030578110
Added to database: 9/23/2025, 12:49:17 AM
Last enriched: 9/23/2025, 1:04:23 AM
Last updated: 11/9/2025, 1:24:33 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12918: Improper Control of Resource Identifiers in yungifez Skuul School Management System
LowCVE-2025-12917: Denial of Service in TOZED ZLT T10
MediumCVE-2025-12916: Command Injection in Sangfor Operation and Maintenance Security Management System
MediumCVE-2025-12915: File Inclusion in 70mai X200
HighCVE-2025-12914: SQL Injection in aaPanel BaoTa
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.