Skip to main content

CVE-2025-11110: SQL Injection in Campcodes Online Learning Management System

Medium
VulnerabilityCVE-2025-11110cvecve-2025-11110
Published: Sun Sep 28 2025 (09/28/2025, 16:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Learning Management System

Description

A security flaw has been discovered in Campcodes Online Learning Management System 1.0. The impacted element is an unknown function of the file /admin/school_year.php. The manipulation of the argument school_year results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 09/28/2025, 16:06:16 UTC

Technical Analysis

CVE-2025-11110 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability resides in an unspecified function within the /admin/school_year.php file, where the 'school_year' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection can lead to unauthorized access or manipulation of the backend database, potentially compromising data confidentiality, integrity, and availability. Although the CVSS score is 6.9 (medium severity), the exploit has been publicly released, increasing the risk of exploitation. The vulnerability does not require privileges or user interaction, making it easier for attackers to exploit. The impact is limited by the fact that the vulnerability affects only version 1.0 of the Campcodes LMS, a niche product primarily used in educational environments. No official patches have been released yet, and no known exploits in the wild have been reported at the time of publication.

Potential Impact

For European organizations, particularly educational institutions using Campcodes LMS version 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive student and staff data, alteration of academic records, or disruption of LMS services. Given the critical role of LMS platforms in managing educational content and student information, a breach could undermine trust, violate data protection regulations such as GDPR, and result in legal and financial consequences. The remote and unauthenticated nature of the attack increases the threat level, especially for institutions with exposed administrative interfaces. Additionally, the public availability of the exploit code raises the likelihood of opportunistic attacks targeting vulnerable systems across Europe.

Mitigation Recommendations

Organizations should immediately audit their LMS deployments to identify any instances of Campcodes Online Learning Management System version 1.0. If found, they should restrict access to the /admin/school_year.php endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to administrative interfaces. Input validation and parameter sanitization should be enforced at the application level to prevent SQL injection, ideally by updating or patching the vulnerable code once a fix is available. In the interim, deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'school_year' parameter can provide a protective layer. Regular monitoring of logs for suspicious activity related to this endpoint is recommended. Organizations should also plan to upgrade to a newer, patched version of the LMS or consider alternative platforms if no patch is forthcoming. Finally, conducting security awareness training for administrators about the risks of exposed admin interfaces can reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-27T17:29:16.983Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d95cdf6dd299fc3f4ba59c

Added to database: 9/28/2025, 4:05:51 PM

Last enriched: 9/28/2025, 4:06:16 PM

Last updated: 9/28/2025, 4:06:29 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats