CVE-2025-13291: SQL Injection in Campcodes Supplier Management System
A vulnerability was found in Campcodes Supplier Management System 1.0. This affects an unknown part of the file /manufacturer/confirm_order.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-13291 is a SQL injection vulnerability identified in Campcodes Supplier Management System version 1.0. The flaw exists in the /manufacturer/confirm_order.php script where the 'ID' parameter is not properly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation could lead to unauthorized data access, modification, or deletion within the underlying database, compromising the confidentiality, integrity, and availability of supplier and order data. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting the moderate impact and ease of exploitation. Although no active exploits have been reported in the wild, the public availability of exploit code increases the likelihood of attacks. The affected product is primarily used in supplier management workflows, which are critical for manufacturing and supply chain operations. The lack of patches or official remediation guidance necessitates immediate defensive measures by organizations using this software. Given the critical nature of supply chain data, exploitation could disrupt business operations and expose sensitive commercial information.
Potential Impact
For European organizations, particularly those in manufacturing, logistics, and supply chain management, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of supplier and order information, manipulation of order data, or disruption of supplier management processes. This could result in financial losses, reputational damage, and operational downtime. The impact is heightened in sectors where supply chain integrity is critical, such as automotive, aerospace, and pharmaceuticals. Additionally, compromised supplier data could facilitate further attacks or fraud. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise without additional weaknesses. However, the remote and unauthenticated nature of the exploit increases the urgency for mitigation. European organizations with integrated supplier management systems relying on Campcodes software are particularly vulnerable to supply chain disruptions and data breaches stemming from this flaw.
Mitigation Recommendations
Organizations should immediately implement input validation and sanitization for the 'ID' parameter in /manufacturer/confirm_order.php to prevent SQL injection. Employing parameterized queries or prepared statements is critical to eliminate injection vectors. Restricting access to the affected endpoint via network segmentation or firewall rules can reduce exposure. Monitoring logs for unusual database queries or access patterns related to the 'ID' parameter can help detect exploitation attempts. If possible, isolate the supplier management system from the internet or untrusted networks until a patch is available. Engage with Campcodes for official patches or updates and apply them promptly once released. Conduct security assessments and penetration testing focused on injection vulnerabilities in related systems. Educate development and operations teams about secure coding practices to prevent similar issues. Finally, maintain regular backups of supplier data to enable recovery in case of data manipulation or loss.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland
CVE-2025-13291: SQL Injection in Campcodes Supplier Management System
Description
A vulnerability was found in Campcodes Supplier Management System 1.0. This affects an unknown part of the file /manufacturer/confirm_order.php. Performing manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13291 is a SQL injection vulnerability identified in Campcodes Supplier Management System version 1.0. The flaw exists in the /manufacturer/confirm_order.php script where the 'ID' parameter is not properly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. Successful exploitation could lead to unauthorized data access, modification, or deletion within the underlying database, compromising the confidentiality, integrity, and availability of supplier and order data. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting the moderate impact and ease of exploitation. Although no active exploits have been reported in the wild, the public availability of exploit code increases the likelihood of attacks. The affected product is primarily used in supplier management workflows, which are critical for manufacturing and supply chain operations. The lack of patches or official remediation guidance necessitates immediate defensive measures by organizations using this software. Given the critical nature of supply chain data, exploitation could disrupt business operations and expose sensitive commercial information.
Potential Impact
For European organizations, particularly those in manufacturing, logistics, and supply chain management, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of supplier and order information, manipulation of order data, or disruption of supplier management processes. This could result in financial losses, reputational damage, and operational downtime. The impact is heightened in sectors where supply chain integrity is critical, such as automotive, aerospace, and pharmaceuticals. Additionally, compromised supplier data could facilitate further attacks or fraud. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise without additional weaknesses. However, the remote and unauthenticated nature of the exploit increases the urgency for mitigation. European organizations with integrated supplier management systems relying on Campcodes software are particularly vulnerable to supply chain disruptions and data breaches stemming from this flaw.
Mitigation Recommendations
Organizations should immediately implement input validation and sanitization for the 'ID' parameter in /manufacturer/confirm_order.php to prevent SQL injection. Employing parameterized queries or prepared statements is critical to eliminate injection vectors. Restricting access to the affected endpoint via network segmentation or firewall rules can reduce exposure. Monitoring logs for unusual database queries or access patterns related to the 'ID' parameter can help detect exploitation attempts. If possible, isolate the supplier management system from the internet or untrusted networks until a patch is available. Engage with Campcodes for official patches or updates and apply them promptly once released. Conduct security assessments and penetration testing focused on injection vulnerabilities in related systems. Educate development and operations teams about secure coding practices to prevent similar issues. Finally, maintain regular backups of supplier data to enable recovery in case of data manipulation or loss.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T08:03:51.225Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691b5a78903b8a3ddb6f53b5
Added to database: 11/17/2025, 5:25:12 PM
Last enriched: 11/24/2025, 5:36:17 PM
Last updated: 1/7/2026, 5:23:13 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.