Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11061: SQL Injection in Campcodes Online Learning Management System

0
Medium
VulnerabilityCVE-2025-11061cvecve-2025-11061
Published: Sat Sep 27 2025 (09/27/2025, 12:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Learning Management System

Description

A vulnerability was found in Campcodes Online Learning Management System 1.0. This affects an unknown part of the file /admin/edit_student.php. Performing manipulation of the argument cys results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 10/05/2025, 00:58:22 UTC

Technical Analysis

CVE-2025-11061 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in the /admin/edit_student.php file, specifically through manipulation of the 'cys' parameter. An attacker can remotely exploit this flaw without any authentication or user interaction, by crafting malicious input that alters the SQL query executed by the application. This can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive data stored within the LMS. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with the vector showing network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated as low individually, but collectively they pose a significant risk to the LMS data integrity and confidentiality. Although no patches or fixes have been published yet, the exploit code is publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the Campcodes LMS, which is a specialized product used primarily in educational environments for managing student data and learning content.

Potential Impact

For European organizations, especially educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized disclosure of student records, grades, and personal information, violating data protection regulations such as GDPR. Integrity of academic records could be compromised, affecting trust and operational continuity. Additionally, attackers could manipulate or delete data, disrupting learning management processes. Since the vulnerability requires no authentication and can be exploited remotely, attackers could target vulnerable systems from anywhere, increasing the threat surface. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise or widespread disruption unless combined with other weaknesses. However, the presence of publicly available exploit code lowers the barrier for attackers, increasing the likelihood of opportunistic attacks. Organizations failing to address this vulnerability risk reputational damage, regulatory penalties, and operational interruptions.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the /admin/edit_student.php endpoint via network-level controls such as IP whitelisting or VPN-only access to limit exposure. Organizations should implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'cys' parameter. Input validation and parameterized queries should be enforced in the application code; however, since no patch is currently available, organizations should engage with the vendor for an official fix or consider upgrading to a later, unaffected version if available. Regularly monitoring logs for suspicious activity related to the vulnerable endpoint is critical for early detection. Additionally, organizations should conduct thorough audits of database integrity and backups to ensure data has not been tampered with. As a longer-term measure, organizations should consider migrating to more secure and actively maintained LMS platforms with robust security practices. Finally, educating administrative users about the risks and signs of exploitation can help in early identification and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T11:59:39.902Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d7dbd632b1dc6cfc30c795

Added to database: 9/27/2025, 12:43:02 PM

Last enriched: 10/5/2025, 12:58:22 AM

Last updated: 11/9/2025, 6:54:28 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats