CVE-2025-11102: SQL Injection in Campcodes Online Learning Management System
A weakness has been identified in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /admin/edit_content.php. Executing manipulation of the argument Title can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-11102 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in an unspecified function within the /admin/edit_content.php file, specifically through manipulation of the 'Title' parameter. This flaw allows an unauthenticated remote attacker to inject malicious SQL code into the backend database queries executed by the LMS. The vulnerability does not require any privileges or user interaction to exploit, making it accessible to any remote attacker with network access to the affected system. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector details highlight that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no authentication required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is rated as low, suggesting that while the attacker can manipulate database queries, the scope of damage may be limited or mitigated by other controls. The vulnerability has been publicly disclosed, but as of now, no known exploits are reported in the wild. However, the public availability of the exploit code increases the risk of exploitation. The lack of available patches or vendor advisories at this time means organizations running Campcodes LMS 1.0 remain exposed. Given that the vulnerability resides in an administrative interface, successful exploitation could allow attackers to alter or extract sensitive content data, potentially leading to unauthorized data disclosure or modification within the LMS environment.
Potential Impact
For European organizations using Campcodes Online Learning Management System version 1.0, this vulnerability poses a tangible risk to the confidentiality and integrity of their educational content and user data. Educational institutions, training providers, and corporate learning departments relying on this LMS could face unauthorized data access or manipulation, potentially disrupting learning operations and compromising sensitive student or employee information. Although the CVSS score suggests a medium severity, the fact that no authentication is required and the exploit is remotely executable increases the risk profile. Exploitation could lead to data breaches, loss of trust, and regulatory non-compliance under GDPR if personal data is exposed. Additionally, manipulation of course content or administrative data could impact the integrity of educational records. The absence of patches means organizations must rely on compensating controls, increasing operational overhead. The impact is particularly significant for organizations with limited cybersecurity resources or those that have not segmented their LMS infrastructure from critical networks.
Mitigation Recommendations
1. Immediate mitigation should include restricting network access to the /admin/edit_content.php endpoint, ideally limiting it to trusted IP addresses or VPN users only. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'Title' parameter. 3. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries, until an official patch is available. 4. Monitor application logs for unusual query patterns or repeated failed attempts to exploit the vulnerability. 5. If feasible, isolate the LMS environment from other critical systems to contain potential breaches. 6. Engage with the vendor for updates and apply patches immediately upon release. 7. Consider migrating to a more secure or updated LMS platform if patching is delayed or unavailable. 8. Educate administrative users about the risk and encourage strong authentication and session management practices to reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-11102: SQL Injection in Campcodes Online Learning Management System
Description
A weakness has been identified in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /admin/edit_content.php. Executing manipulation of the argument Title can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-11102 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in an unspecified function within the /admin/edit_content.php file, specifically through manipulation of the 'Title' parameter. This flaw allows an unauthenticated remote attacker to inject malicious SQL code into the backend database queries executed by the LMS. The vulnerability does not require any privileges or user interaction to exploit, making it accessible to any remote attacker with network access to the affected system. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector details highlight that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no authentication required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is rated as low, suggesting that while the attacker can manipulate database queries, the scope of damage may be limited or mitigated by other controls. The vulnerability has been publicly disclosed, but as of now, no known exploits are reported in the wild. However, the public availability of the exploit code increases the risk of exploitation. The lack of available patches or vendor advisories at this time means organizations running Campcodes LMS 1.0 remain exposed. Given that the vulnerability resides in an administrative interface, successful exploitation could allow attackers to alter or extract sensitive content data, potentially leading to unauthorized data disclosure or modification within the LMS environment.
Potential Impact
For European organizations using Campcodes Online Learning Management System version 1.0, this vulnerability poses a tangible risk to the confidentiality and integrity of their educational content and user data. Educational institutions, training providers, and corporate learning departments relying on this LMS could face unauthorized data access or manipulation, potentially disrupting learning operations and compromising sensitive student or employee information. Although the CVSS score suggests a medium severity, the fact that no authentication is required and the exploit is remotely executable increases the risk profile. Exploitation could lead to data breaches, loss of trust, and regulatory non-compliance under GDPR if personal data is exposed. Additionally, manipulation of course content or administrative data could impact the integrity of educational records. The absence of patches means organizations must rely on compensating controls, increasing operational overhead. The impact is particularly significant for organizations with limited cybersecurity resources or those that have not segmented their LMS infrastructure from critical networks.
Mitigation Recommendations
1. Immediate mitigation should include restricting network access to the /admin/edit_content.php endpoint, ideally limiting it to trusted IP addresses or VPN users only. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'Title' parameter. 3. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries, until an official patch is available. 4. Monitor application logs for unusual query patterns or repeated failed attempts to exploit the vulnerability. 5. If feasible, isolate the LMS environment from other critical systems to contain potential breaches. 6. Engage with the vendor for updates and apply patches immediately upon release. 7. Consider migrating to a more secure or updated LMS platform if patching is delayed or unavailable. 8. Educate administrative users about the risk and encourage strong authentication and session management practices to reduce attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-27T08:22:23.649Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d9ce3549cfd472f579503a
Added to database: 9/29/2025, 12:09:25 AM
Last enriched: 9/29/2025, 12:10:45 AM
Last updated: 9/29/2025, 1:28:18 AM
Views: 3
Related Threats
CVE-2025-11135: Deserialization in pmTicket Project-Management-Software
MediumCVE-2025-9904: CWE-696: Incorrect Behavior Order in Canon Inc. Generic Plus PCL6 Printer Driver
MediumCVE-2025-9903: CWE-787: Out-of-bounds Write in Canon Inc. Generic Plus PCL6 Printer Driver
MediumCVE-2025-7698: CWE-125: Out-of-bounds Read in Canon Inc. Generic Plus PCL6 Printer Driver
MediumCVE-2025-11134: Cross Site Scripting in Cudy TR1200
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.