Skip to main content

CVE-2025-11102: SQL Injection in Campcodes Online Learning Management System

Medium
VulnerabilityCVE-2025-11102cvecve-2025-11102
Published: Sun Sep 28 2025 (09/28/2025, 07:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Learning Management System

Description

A weakness has been identified in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /admin/edit_content.php. Executing manipulation of the argument Title can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 09/29/2025, 00:10:45 UTC

Technical Analysis

CVE-2025-11102 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in an unspecified function within the /admin/edit_content.php file, specifically through manipulation of the 'Title' parameter. This flaw allows an unauthenticated remote attacker to inject malicious SQL code into the backend database queries executed by the LMS. The vulnerability does not require any privileges or user interaction to exploit, making it accessible to any remote attacker with network access to the affected system. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector details highlight that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no authentication required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is rated as low, suggesting that while the attacker can manipulate database queries, the scope of damage may be limited or mitigated by other controls. The vulnerability has been publicly disclosed, but as of now, no known exploits are reported in the wild. However, the public availability of the exploit code increases the risk of exploitation. The lack of available patches or vendor advisories at this time means organizations running Campcodes LMS 1.0 remain exposed. Given that the vulnerability resides in an administrative interface, successful exploitation could allow attackers to alter or extract sensitive content data, potentially leading to unauthorized data disclosure or modification within the LMS environment.

Potential Impact

For European organizations using Campcodes Online Learning Management System version 1.0, this vulnerability poses a tangible risk to the confidentiality and integrity of their educational content and user data. Educational institutions, training providers, and corporate learning departments relying on this LMS could face unauthorized data access or manipulation, potentially disrupting learning operations and compromising sensitive student or employee information. Although the CVSS score suggests a medium severity, the fact that no authentication is required and the exploit is remotely executable increases the risk profile. Exploitation could lead to data breaches, loss of trust, and regulatory non-compliance under GDPR if personal data is exposed. Additionally, manipulation of course content or administrative data could impact the integrity of educational records. The absence of patches means organizations must rely on compensating controls, increasing operational overhead. The impact is particularly significant for organizations with limited cybersecurity resources or those that have not segmented their LMS infrastructure from critical networks.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the /admin/edit_content.php endpoint, ideally limiting it to trusted IP addresses or VPN users only. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'Title' parameter. 3. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries, until an official patch is available. 4. Monitor application logs for unusual query patterns or repeated failed attempts to exploit the vulnerability. 5. If feasible, isolate the LMS environment from other critical systems to contain potential breaches. 6. Engage with the vendor for updates and apply patches immediately upon release. 7. Consider migrating to a more secure or updated LMS platform if patching is delayed or unavailable. 8. Educate administrative users about the risk and encourage strong authentication and session management practices to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T08:22:23.649Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d9ce3549cfd472f579503a

Added to database: 9/29/2025, 12:09:25 AM

Last enriched: 9/29/2025, 12:10:45 AM

Last updated: 9/29/2025, 1:28:18 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats