Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11064: SQL Injection in Campcodes Online Learning Management System

0
Medium
VulnerabilityCVE-2025-11064cvecve-2025-11064
Published: Sat Sep 27 2025 (09/27/2025, 14:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Learning Management System

Description

A security flaw has been discovered in Campcodes Online Learning Management System 1.0. Impacted is an unknown function of the file /admin/teachers.php. The manipulation of the argument department results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 10/05/2025, 00:55:11 UTC

Technical Analysis

CVE-2025-11064 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The flaw exists in the /admin/teachers.php file, specifically through the manipulation of the 'department' parameter. This parameter is vulnerable to injection of malicious SQL code, allowing an attacker to interfere with the queries executed by the backend database. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), meaning an attacker could potentially read, modify, or disrupt data but with some constraints. The scope is unchanged (S:N), and no security controls are bypassed (SA:N). Although no public exploit is currently known to be actively used in the wild, the exploit code has been publicly released, increasing the likelihood of exploitation attempts. The vulnerability affects only version 1.0 of the Campcodes LMS, which is a specialized platform used for managing online learning environments, particularly in educational institutions. The lack of available patches at the time of publication further elevates the risk for organizations using this software. Given the nature of LMS platforms, exploitation could lead to unauthorized access to sensitive educational data, manipulation of teacher or student records, and potential disruption of educational services.

Potential Impact

For European organizations, especially educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of personal data of students and staff, violating GDPR regulations and resulting in legal and financial penalties. Integrity of educational records could be compromised, affecting grading, attendance, and certification processes. Availability impacts could disrupt online learning activities, particularly critical in contexts relying heavily on remote education. The remote, unauthenticated nature of the exploit increases the risk of widespread attacks, especially in countries with high adoption of Campcodes LMS or similar platforms. The public availability of exploit code means attackers could automate attacks, targeting vulnerable systems en masse. This could also lead to reputational damage for affected institutions and undermine trust in digital education platforms across Europe.

Mitigation Recommendations

Organizations should immediately assess their use of Campcodes LMS version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement web application firewall (WAF) rules to detect and block SQL injection attempts targeting the 'department' parameter in /admin/teachers.php. Employ input validation and parameterized queries or prepared statements in the application code to prevent injection. Restrict access to the /admin directory to trusted IP addresses or via VPN to reduce exposure. Conduct thorough logging and monitoring for suspicious database query patterns or unusual access attempts. Educate administrators about the vulnerability and the importance of applying mitigations promptly. Regularly back up LMS data to enable recovery in case of data corruption or loss. Coordinate with the vendor for timely patch releases and security advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T11:59:55.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d87cd15d6228f86ddc9255

Added to database: 9/28/2025, 12:09:53 AM

Last enriched: 10/5/2025, 12:55:11 AM

Last updated: 10/7/2025, 1:50:28 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats