CVE-2025-11110: SQL Injection in Campcodes Online Learning Management System
A security flaw has been discovered in Campcodes Online Learning Management System 1.0. The impacted element is an unknown function of the file /admin/school_year.php. The manipulation of the argument school_year results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-11110 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability resides in an unspecified function within the /admin/school_year.php file, where the 'school_year' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection can lead to unauthorized access or manipulation of the backend database, potentially compromising data confidentiality, integrity, and availability. Although the CVSS score is 6.9 (medium severity), the exploit has been publicly released, increasing the risk of exploitation. The vulnerability does not require privileges or user interaction, making it easier for attackers to exploit. The impact is limited by the fact that the vulnerability affects only version 1.0 of the Campcodes LMS, a niche product primarily used in educational environments. No official patches have been released yet, and no known exploits in the wild have been reported at the time of publication.
Potential Impact
For European organizations, particularly educational institutions using Campcodes LMS version 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive student and staff data, alteration of academic records, or disruption of LMS services. Given the critical role of LMS platforms in managing educational content and student information, a breach could undermine trust, violate data protection regulations such as GDPR, and result in legal and financial consequences. The remote and unauthenticated nature of the attack increases the threat level, especially for institutions with exposed administrative interfaces. Additionally, the public availability of the exploit code raises the likelihood of opportunistic attacks targeting vulnerable systems across Europe.
Mitigation Recommendations
Organizations should immediately audit their LMS deployments to identify any instances of Campcodes Online Learning Management System version 1.0. If found, they should restrict access to the /admin/school_year.php endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to administrative interfaces. Input validation and parameter sanitization should be enforced at the application level to prevent SQL injection, ideally by updating or patching the vulnerable code once a fix is available. In the interim, deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'school_year' parameter can provide a protective layer. Regular monitoring of logs for suspicious activity related to this endpoint is recommended. Organizations should also plan to upgrade to a newer, patched version of the LMS or consider alternative platforms if no patch is forthcoming. Finally, conducting security awareness training for administrators about the risks of exposed admin interfaces can reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-11110: SQL Injection in Campcodes Online Learning Management System
Description
A security flaw has been discovered in Campcodes Online Learning Management System 1.0. The impacted element is an unknown function of the file /admin/school_year.php. The manipulation of the argument school_year results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-11110 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability resides in an unspecified function within the /admin/school_year.php file, where the 'school_year' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection can lead to unauthorized access or manipulation of the backend database, potentially compromising data confidentiality, integrity, and availability. Although the CVSS score is 6.9 (medium severity), the exploit has been publicly released, increasing the risk of exploitation. The vulnerability does not require privileges or user interaction, making it easier for attackers to exploit. The impact is limited by the fact that the vulnerability affects only version 1.0 of the Campcodes LMS, a niche product primarily used in educational environments. No official patches have been released yet, and no known exploits in the wild have been reported at the time of publication.
Potential Impact
For European organizations, particularly educational institutions using Campcodes LMS version 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized disclosure of sensitive student and staff data, alteration of academic records, or disruption of LMS services. Given the critical role of LMS platforms in managing educational content and student information, a breach could undermine trust, violate data protection regulations such as GDPR, and result in legal and financial consequences. The remote and unauthenticated nature of the attack increases the threat level, especially for institutions with exposed administrative interfaces. Additionally, the public availability of the exploit code raises the likelihood of opportunistic attacks targeting vulnerable systems across Europe.
Mitigation Recommendations
Organizations should immediately audit their LMS deployments to identify any instances of Campcodes Online Learning Management System version 1.0. If found, they should restrict access to the /admin/school_year.php endpoint by implementing network-level controls such as IP whitelisting or VPN-only access to administrative interfaces. Input validation and parameter sanitization should be enforced at the application level to prevent SQL injection, ideally by updating or patching the vulnerable code once a fix is available. In the interim, deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'school_year' parameter can provide a protective layer. Regular monitoring of logs for suspicious activity related to this endpoint is recommended. Organizations should also plan to upgrade to a newer, patched version of the LMS or consider alternative platforms if no patch is forthcoming. Finally, conducting security awareness training for administrators about the risks of exposed admin interfaces can reduce the attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-27T17:29:16.983Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d95cdf6dd299fc3f4ba59c
Added to database: 9/28/2025, 4:05:51 PM
Last enriched: 9/28/2025, 4:06:16 PM
Last updated: 9/28/2025, 4:06:29 PM
Views: 2
Related Threats
CVE-2025-11112: Cross Site Scripting in PHPGurukul Employee Record Management System
MediumCVE-2025-11111: SQL Injection in Campcodes Advanced Online Voting Management System
MediumCVE-2025-11109: SQL Injection in Campcodes Computer Sales and Inventory System
MediumCVE-2025-11108: SQL Injection in code-projects Simple Scheduling System
MediumCVE-2025-11107: SQL Injection in code-projects Simple Scheduling System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.