CVE-2025-13291: SQL Injection in Campcodes Supplier Management System
A vulnerability was found in Campcodes Supplier Management System 1.0. This affects an unknown part of the file /manufacturer/confirm_order.php. Performing a manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-13291 identifies a SQL injection vulnerability in Campcodes Supplier Management System version 1.0, located in the /manufacturer/confirm_order.php script. The vulnerability is triggered by manipulating the 'ID' parameter, which is not properly sanitized before being used in SQL queries. This flaw allows remote attackers to inject arbitrary SQL commands without requiring authentication or user interaction, enabling unauthorized access to or modification of the underlying database. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no privileges or user interaction needed, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects only version 1.0 of the product, which is used in supplier management workflows, potentially exposing sensitive order and manufacturer data. No official patches have been linked yet, necessitating immediate mitigation efforts by users. The vulnerability's exploitation could lead to data leakage, unauthorized data manipulation, or disruption of supplier order processing, impacting business operations and trust.
Potential Impact
The SQL injection vulnerability in Campcodes Supplier Management System 1.0 can have significant impacts on organizations relying on this software for supplier and order management. Successful exploitation could lead to unauthorized disclosure of sensitive supplier and order information, modification or deletion of critical data, and potential disruption of supply chain operations. This could result in financial losses, reputational damage, and regulatory compliance issues, especially for organizations handling sensitive or regulated data. The remote, unauthenticated nature of the attack increases the risk, as attackers can exploit the vulnerability without insider access or user interaction. While the impact is somewhat limited by the scope of affected systems (only Campcodes Supplier Management System 1.0), organizations with critical supply chain dependencies on this product face elevated risk. The lack of a current patch further exacerbates the threat, requiring proactive mitigation to prevent exploitation.
Mitigation Recommendations
1. Immediate mitigation should include implementing input validation and parameterized queries or prepared statements in the /manufacturer/confirm_order.php script to prevent SQL injection. 2. If source code modification is not feasible immediately, deploy Web Application Firewalls (WAFs) with custom rules to detect and block malicious SQL injection payloads targeting the 'ID' parameter. 3. Restrict network access to the Supplier Management System to trusted IP ranges and enforce strict access controls to reduce exposure. 4. Monitor application logs and network traffic for unusual or suspicious activity related to SQL injection attempts. 5. Engage with the vendor Campcodes for official patches or updates and apply them promptly once available. 6. Conduct security assessments and code reviews of the Supplier Management System to identify and remediate other potential injection points. 7. Educate development and operations teams about secure coding practices and the risks of SQL injection vulnerabilities. 8. Consider isolating the affected system in a segmented network zone to limit potential lateral movement in case of compromise.
Affected Countries
United States, Germany, China, India, United Kingdom, Japan, South Korea, France, Canada, Australia
CVE-2025-13291: SQL Injection in Campcodes Supplier Management System
Description
A vulnerability was found in Campcodes Supplier Management System 1.0. This affects an unknown part of the file /manufacturer/confirm_order.php. Performing a manipulation of the argument ID results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13291 identifies a SQL injection vulnerability in Campcodes Supplier Management System version 1.0, located in the /manufacturer/confirm_order.php script. The vulnerability is triggered by manipulating the 'ID' parameter, which is not properly sanitized before being used in SQL queries. This flaw allows remote attackers to inject arbitrary SQL commands without requiring authentication or user interaction, enabling unauthorized access to or modification of the underlying database. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no privileges or user interaction needed, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public disclosure of exploit code increases the likelihood of exploitation attempts. The vulnerability affects only version 1.0 of the product, which is used in supplier management workflows, potentially exposing sensitive order and manufacturer data. No official patches have been linked yet, necessitating immediate mitigation efforts by users. The vulnerability's exploitation could lead to data leakage, unauthorized data manipulation, or disruption of supplier order processing, impacting business operations and trust.
Potential Impact
The SQL injection vulnerability in Campcodes Supplier Management System 1.0 can have significant impacts on organizations relying on this software for supplier and order management. Successful exploitation could lead to unauthorized disclosure of sensitive supplier and order information, modification or deletion of critical data, and potential disruption of supply chain operations. This could result in financial losses, reputational damage, and regulatory compliance issues, especially for organizations handling sensitive or regulated data. The remote, unauthenticated nature of the attack increases the risk, as attackers can exploit the vulnerability without insider access or user interaction. While the impact is somewhat limited by the scope of affected systems (only Campcodes Supplier Management System 1.0), organizations with critical supply chain dependencies on this product face elevated risk. The lack of a current patch further exacerbates the threat, requiring proactive mitigation to prevent exploitation.
Mitigation Recommendations
1. Immediate mitigation should include implementing input validation and parameterized queries or prepared statements in the /manufacturer/confirm_order.php script to prevent SQL injection. 2. If source code modification is not feasible immediately, deploy Web Application Firewalls (WAFs) with custom rules to detect and block malicious SQL injection payloads targeting the 'ID' parameter. 3. Restrict network access to the Supplier Management System to trusted IP ranges and enforce strict access controls to reduce exposure. 4. Monitor application logs and network traffic for unusual or suspicious activity related to SQL injection attempts. 5. Engage with the vendor Campcodes for official patches or updates and apply them promptly once available. 6. Conduct security assessments and code reviews of the Supplier Management System to identify and remediate other potential injection points. 7. Educate development and operations teams about secure coding practices and the risks of SQL injection vulnerabilities. 8. Consider isolating the affected system in a segmented network zone to limit potential lateral movement in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-17T08:03:51.225Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691b5a78903b8a3ddb6f53b5
Added to database: 11/17/2025, 5:25:12 PM
Last enriched: 2/24/2026, 10:03:52 PM
Last updated: 3/24/2026, 3:07:06 PM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.