CVE-2025-11061: SQL Injection in Campcodes Online Learning Management System
A vulnerability was found in Campcodes Online Learning Management System 1.0. This affects an unknown part of the file /admin/edit_student.php. Performing manipulation of the argument cys results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-11061 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in the /admin/edit_student.php file, specifically through manipulation of the 'cys' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by crafting malicious input that alters the SQL query executed by the application. This can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive data stored within the LMS. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with the vector showing network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated as low individually, but collectively they pose a significant risk to the LMS data integrity and confidentiality. Although no patches or fixes have been published yet, the exploit code is publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the Campcodes LMS, which is a specialized product used primarily in educational environments for managing student data and learning content.
Potential Impact
For European organizations, especially educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized disclosure of student records, grades, and personal information, violating data protection regulations such as GDPR. Integrity of academic records could be compromised, affecting trust and operational continuity. Additionally, attackers could manipulate or delete data, disrupting learning management processes. Since the vulnerability requires no authentication and can be exploited remotely, attackers could target vulnerable systems from anywhere, increasing the threat surface. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise or widespread disruption unless combined with other weaknesses. However, the presence of publicly available exploit code lowers the barrier for attackers, increasing the likelihood of opportunistic attacks. Organizations failing to address this vulnerability risk reputational damage, regulatory penalties, and operational interruptions.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the /admin/edit_student.php endpoint via network-level controls such as IP whitelisting or VPN-only access to limit exposure. Organizations should implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'cys' parameter. Input validation and parameterized queries should be enforced in the application code; however, since no patch is currently available, organizations should engage with the vendor for an official fix or consider upgrading to a later, unaffected version if available. Regularly monitoring logs for suspicious activity related to the vulnerable endpoint is critical for early detection. Additionally, organizations should conduct thorough audits of database integrity and backups to ensure data has not been tampered with. As a longer-term measure, organizations should consider migrating to more secure and actively maintained LMS platforms with robust security practices. Finally, educating administrative users about the risks and signs of exploitation can help in early identification and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-11061: SQL Injection in Campcodes Online Learning Management System
Description
A vulnerability was found in Campcodes Online Learning Management System 1.0. This affects an unknown part of the file /admin/edit_student.php. Performing manipulation of the argument cys results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11061 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in the /admin/edit_student.php file, specifically through manipulation of the 'cys' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by crafting malicious input that alters the SQL query executed by the application. This can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive data stored within the LMS. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with the vector showing network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated as low individually, but collectively they pose a significant risk to the LMS data integrity and confidentiality. Although no patches or fixes have been published yet, the exploit code is publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the Campcodes LMS, which is a specialized product used primarily in educational environments for managing student data and learning content.
Potential Impact
For European organizations, especially educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized disclosure of student records, grades, and personal information, violating data protection regulations such as GDPR. Integrity of academic records could be compromised, affecting trust and operational continuity. Additionally, attackers could manipulate or delete data, disrupting learning management processes. Since the vulnerability requires no authentication and can be exploited remotely, attackers could target vulnerable systems from anywhere, increasing the threat surface. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise or widespread disruption unless combined with other weaknesses. However, the presence of publicly available exploit code lowers the barrier for attackers, increasing the likelihood of opportunistic attacks. Organizations failing to address this vulnerability risk reputational damage, regulatory penalties, and operational interruptions.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the /admin/edit_student.php endpoint via network-level controls such as IP whitelisting or VPN-only access to limit exposure. Organizations should implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'cys' parameter. Input validation and parameterized queries should be enforced in the application code; however, since no patch is currently available, organizations should engage with the vendor for an official fix or consider upgrading to a later, unaffected version if available. Regularly monitoring logs for suspicious activity related to the vulnerable endpoint is critical for early detection. Additionally, organizations should conduct thorough audits of database integrity and backups to ensure data has not been tampered with. As a longer-term measure, organizations should consider migrating to more secure and actively maintained LMS platforms with robust security practices. Finally, educating administrative users about the risks and signs of exploitation can help in early identification and response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-26T11:59:39.902Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d7dbd632b1dc6cfc30c795
Added to database: 9/27/2025, 12:43:02 PM
Last enriched: 10/5/2025, 12:58:22 AM
Last updated: 11/9/2025, 6:54:28 PM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12918: Improper Control of Resource Identifiers in yungifez Skuul School Management System
LowCVE-2025-12917: Denial of Service in TOZED ZLT T10
MediumCVE-2025-12916: Command Injection in Sangfor Operation and Maintenance Security Management System
MediumCVE-2025-12915: File Inclusion in 70mai X200
HighCVE-2025-12914: SQL Injection in aaPanel BaoTa
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.