Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13554: SQL Injection in Campcodes Supplier Management System

0
Medium
VulnerabilityCVE-2025-13554cvecve-2025-13554
Published: Sun Nov 23 2025 (11/23/2025, 15:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Supplier Management System

Description

A security vulnerability has been detected in Campcodes Supplier Management System 1.0. This impacts an unknown function of the file /index.php of the component Login. Such manipulation of the argument txtUsername leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:08:38 UTC

Technical Analysis

CVE-2025-13554 identifies a SQL injection vulnerability in Campcodes Supplier Management System version 1.0. The issue is located in the /index.php file, specifically in the Login component where the txtUsername parameter is improperly sanitized. This allows an attacker to inject arbitrary SQL commands remotely without requiring authentication or user interaction. The vulnerability could enable attackers to bypass authentication, extract sensitive supplier or organizational data, modify or delete database records, or potentially escalate privileges within the application. The CVSS 4.0 vector indicates the attack can be performed remotely (AV:N) with low complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low to medium, but the scope is limited to the affected component. No patches or fixes have been publicly linked yet, and no known exploits are currently reported in the wild. However, the public disclosure increases the risk of exploitation attempts. Organizations relying on Campcodes Supplier Management System 1.0 should assess their exposure and implement immediate mitigations or seek vendor updates once available.

Potential Impact

The SQL injection vulnerability in Campcodes Supplier Management System 1.0 can have significant impacts on organizations using this software. Exploitation could lead to unauthorized access to sensitive supplier and business data, potentially exposing confidential information or intellectual property. Attackers might manipulate or delete critical database records, disrupting supply chain operations and causing data integrity issues. The ability to bypass authentication could allow attackers to gain elevated access, leading to further compromise of internal systems. Such disruptions can result in operational downtime, financial losses, reputational damage, and regulatory compliance violations, especially for organizations in regulated industries. Given the remote exploitability without authentication, the threat surface is broad, increasing the urgency for mitigation. While no active exploits are reported, the public disclosure may prompt attackers to develop weaponized exploits, increasing risk over time.

Mitigation Recommendations

To mitigate CVE-2025-13554, organizations should first verify if they are running Campcodes Supplier Management System version 1.0 and isolate affected instances. Immediate steps include implementing web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the txtUsername parameter in /index.php. Input validation and sanitization should be enforced at the application level, employing parameterized queries or prepared statements to prevent injection. Network segmentation can limit exposure of the vulnerable system to untrusted networks. Monitoring and logging of login attempts and unusual database queries should be enhanced to detect exploitation attempts early. Organizations should engage with the vendor for patches or updates and apply them promptly once available. Additionally, conducting a thorough security audit of the supplier management system and related infrastructure can identify other potential weaknesses. User awareness training on recognizing suspicious activity related to supplier systems can also aid in early detection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:28:27.246Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692330ff650f1bc966f5721e

Added to database: 11/23/2025, 4:06:23 PM

Last enriched: 2/24/2026, 10:08:38 PM

Last updated: 3/23/2026, 5:33:51 PM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses