Skip to main content

CVE-2025-11075: SQL Injection in Campcodes Online Learning Management System

Medium
VulnerabilityCVE-2025-11075cvecve-2025-11075
Published: Sat Sep 27 2025 (09/27/2025, 19:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Learning Management System

Description

A vulnerability has been found in Campcodes Online Learning Management System 1.0. This affects an unknown function of the file /admin/de_activate.php. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/27/2025, 19:05:57 UTC

Technical Analysis

CVE-2025-11075 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The flaw exists in the /admin/de_activate.php file, specifically involving the manipulation of the 'ID' parameter. An attacker can exploit this vulnerability by sending crafted input to this parameter, which is not properly sanitized or parameterized, allowing arbitrary SQL commands to be injected and executed on the backend database. This vulnerability is remotely exploitable without requiring authentication or user interaction, making it particularly dangerous. The CVSS 4.0 base score of 6.9 (medium severity) reflects the ease of exploitation (network attack vector, low attack complexity) and the potential impact on confidentiality, integrity, and availability, though these impacts are rated as low individually. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits have been reported in the wild yet. Given the nature of SQL Injection, successful exploitation could allow attackers to read, modify, or delete sensitive data, escalate privileges, or disrupt LMS operations, potentially affecting user data and institutional records. The lack of available patches or mitigation guidance from the vendor at this time increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations using Campcodes LMS version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of educational data, including student records, course materials, and administrative information. Exploitation could lead to unauthorized data disclosure, data tampering, or denial of service, disrupting educational services and damaging institutional reputation. Given the increasing reliance on digital learning platforms in Europe, such an attack could affect not only individual institutions but also broader educational networks. Additionally, compromised LMS systems could serve as pivot points for further attacks within organizational networks, potentially exposing other critical systems. Compliance with European data protection regulations such as GDPR means that data breaches resulting from this vulnerability could lead to legal penalties and financial losses.

Mitigation Recommendations

Immediate mitigation should focus on implementing input validation and parameterized queries or prepared statements in the /admin/de_activate.php script to prevent SQL Injection. Since no official patches are currently available, organizations should consider the following practical steps: 1) Restrict access to the /admin/de_activate.php endpoint using network-level controls such as IP whitelisting or VPN-only access to limit exposure. 2) Employ Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts targeting the vulnerable parameter. 3) Monitor logs for suspicious activity related to the 'ID' parameter and unusual database queries. 4) Conduct a thorough audit of LMS user privileges and database permissions to minimize potential damage from exploitation. 5) Plan for an urgent update or patch deployment once the vendor releases a fix. 6) Educate administrators about the risks and signs of exploitation to enable rapid incident response. These targeted mitigations go beyond generic advice by focusing on the specific vulnerable component and the operational context of the LMS.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T12:53:41.710Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d8358076282b26dbbfa827

Added to database: 9/27/2025, 7:05:36 PM

Last enriched: 9/27/2025, 7:05:57 PM

Last updated: 9/28/2025, 12:09:50 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats