Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13259: SQL Injection in Campcodes Supplier Management System

0
Medium
VulnerabilityCVE-2025-13259cvecve-2025-13259
Published: Mon Nov 17 2025 (11/17/2025, 02:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Supplier Management System

Description

A flaw has been found in Campcodes Supplier Management System 1.0. This affects an unknown function of the file /manufacturer/edit_unit.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:24:42 UTC

Technical Analysis

CVE-2025-13259 is a SQL injection vulnerability identified in Campcodes Supplier Management System version 1.0. The vulnerability resides in the /manufacturer/edit_unit.php script, where the ID parameter is improperly sanitized, allowing an attacker to inject arbitrary SQL commands. This flaw can be exploited remotely without requiring authentication or user interaction, making it accessible to unauthenticated attackers over the network. The vulnerability can lead to unauthorized data access, modification, or deletion within the backend database, potentially compromising confidentiality, integrity, and availability of supplier management data. The CVSS 4.0 score is 5.3 (medium), reflecting low complexity of attack (no authentication or user interaction needed) but limited scope and impact due to the specific affected component and partial impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public availability of an exploit increases the risk of future attacks. The vulnerability highlights the importance of proper input validation and parameterized queries in web applications managing critical supply chain data. No official patch has been published yet, requiring organizations to implement interim mitigations.

Potential Impact

The SQL injection vulnerability in Campcodes Supplier Management System can allow attackers to remotely execute arbitrary SQL commands, potentially leading to unauthorized disclosure, modification, or deletion of sensitive supplier and manufacturing data. This could disrupt supply chain operations, cause data integrity issues, and result in downtime or loss of availability of the management system. Organizations relying on this system for supplier coordination and inventory management may face operational disruptions and reputational damage if exploited. The impact is particularly significant for companies with critical supply chain dependencies or regulatory compliance requirements involving data protection. Since the vulnerability requires no authentication, it increases the attack surface and risk of exploitation by external threat actors. However, the impact is somewhat limited by the niche usage of the Campcodes Supplier Management System 1.0, reducing the overall global exposure compared to more widely deployed software.

Mitigation Recommendations

1. Apply patches or updates from Campcodes as soon as they become available to remediate the SQL injection vulnerability. 2. Until a patch is released, implement web application firewall (WAF) rules to detect and block SQL injection attempts targeting the /manufacturer/edit_unit.php endpoint and the ID parameter. 3. Conduct a thorough code review of the affected module to implement proper input validation and use parameterized queries or prepared statements to prevent injection. 4. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. 5. Monitor logs and network traffic for suspicious activity indicative of SQL injection attempts. 6. Educate developers on secure coding practices to prevent similar vulnerabilities in future releases. 7. If feasible, isolate the supplier management system network segment to reduce exposure to external threats. 8. Perform regular security assessments and penetration testing focused on injection vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-16T10:51:10.341Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691a8f51c118c0da2e582c7c

Added to database: 11/17/2025, 2:58:25 AM

Last enriched: 2/24/2026, 10:24:42 PM

Last updated: 3/22/2026, 12:40:01 PM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses