Skip to main content

CVE-2025-11077: SQL Injection in Campcodes Online Learning Management System

Medium
VulnerabilityCVE-2025-11077cvecve-2025-11077
Published: Sat Sep 27 2025 (09/27/2025, 20:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Learning Management System

Description

A vulnerability was determined in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /admin/add_content.php. Executing manipulation of the argument Title can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 09/27/2025, 20:09:54 UTC

Technical Analysis

CVE-2025-11077 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in an unspecified function within the /admin/add_content.php file, specifically involving the manipulation of the 'Title' argument. An attacker can exploit this flaw by sending crafted input remotely without any authentication or user interaction, allowing them to inject malicious SQL commands into the backend database queries. This can lead to unauthorized access, data leakage, data modification, or even complete compromise of the LMS database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector of network (remote), no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is rated as low to medium, suggesting that while the vulnerability is exploitable remotely and easily, the extent of damage may be somewhat limited by the specific application context or database permissions. No patches or fixes have been publicly linked yet, and there are no known exploits actively observed in the wild at this time. However, the public disclosure of the vulnerability increases the risk of exploitation attempts by attackers targeting vulnerable LMS installations.

Potential Impact

For European organizations, particularly educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive educational data, including student records, course content, and administrative information. Successful exploitation could lead to unauthorized data disclosure, modification of course materials, or disruption of LMS services, potentially impacting learning continuity and institutional reputation. Given the remote and unauthenticated nature of the exploit, attackers could leverage this vulnerability to gain a foothold within the network or pivot to other internal systems. This is especially concerning for organizations bound by GDPR, as data breaches involving personal data could result in regulatory penalties and loss of trust. The medium severity rating suggests that while the vulnerability is serious, the overall impact might be mitigated if the LMS is deployed with proper database access controls and network segmentation.

Mitigation Recommendations

Organizations should immediately audit their LMS deployments to identify any instances of Campcodes Online Learning Management System version 1.0. Until an official patch is released, it is critical to implement compensating controls such as: 1) Restricting network access to the LMS admin interface to trusted IP addresses or VPN-only access to reduce exposure. 2) Implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'Title' parameter in /admin/add_content.php. 3) Reviewing and tightening database user permissions to ensure the LMS application account has the least privileges necessary, limiting the potential damage from injection attacks. 4) Monitoring application logs and database logs for suspicious queries or unusual activity indicative of exploitation attempts. 5) Encouraging users to upgrade to newer, patched versions of the LMS once available, or consider alternative LMS platforms with active security support. Additionally, conducting regular security assessments and penetration tests focusing on injection vulnerabilities can help identify and remediate similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T12:53:46.639Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d8447f1c0197ce5ba4800d

Added to database: 9/27/2025, 8:09:35 PM

Last enriched: 9/27/2025, 8:09:54 PM

Last updated: 9/27/2025, 10:34:05 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats