Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13555: SQL Injection in Campcodes School File Management System

0
Medium
VulnerabilityCVE-2025-13555cvecve-2025-13555
Published: Sun Nov 23 2025 (11/23/2025, 15:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: School File Management System

Description

A vulnerability was detected in Campcodes School File Management System 1.0. Affected is an unknown function of the file /index.php of the component Login. Performing manipulation of the argument stud_no results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 11/23/2025, 15:53:48 UTC

Technical Analysis

CVE-2025-13555 identifies a SQL injection vulnerability in version 1.0 of the Campcodes School File Management System, specifically within the login component's /index.php file. The vulnerability arises from improper sanitization of the stud_no parameter, which can be manipulated remotely without authentication or user interaction to inject malicious SQL queries. This flaw allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data retrieval, modification, or deletion. The CVSS 4.0 base score is 6.9 (medium), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, a public exploit is available, increasing the risk of attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The lack of secure coding practices in input validation and parameterized queries is the root cause. This vulnerability is critical for environments managing sensitive student data, as it can lead to data breaches or operational disruption.

Potential Impact

For European organizations, particularly educational institutions using Campcodes School File Management System 1.0, this vulnerability poses a significant risk of unauthorized access to sensitive student records and administrative data. Exploitation can result in data leakage, data tampering, or denial of service, undermining confidentiality, integrity, and availability of critical educational data. Given the remote and unauthenticated nature of the attack, threat actors can easily target vulnerable systems over the internet. This can lead to reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The medium severity score indicates a moderate but tangible risk, especially in environments lacking compensating controls. The presence of a public exploit increases the likelihood of opportunistic attacks. Organizations may also face challenges in incident response and recovery if backups or monitoring are insufficient. Overall, the vulnerability threatens data privacy and system reliability in European educational sectors.

Mitigation Recommendations

Immediate mitigation should focus on applying vendor-provided patches once available. In the absence of official patches, organizations should implement strict input validation on the stud_no parameter, ensuring only expected numeric or alphanumeric formats are accepted. Employing parameterized SQL queries or prepared statements can prevent injection attacks by separating code from data. Web application firewalls (WAFs) can be configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Regular security audits and code reviews should be conducted to identify similar vulnerabilities. Network segmentation and limiting external access to the management system can reduce exposure. Monitoring logs for unusual database queries or repeated failed login attempts can help detect exploitation attempts early. Lastly, organizations should maintain up-to-date backups and have an incident response plan tailored to data breach scenarios involving educational data.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T15:29:47.289Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69232a874f4cb01c4da9aee5

Added to database: 11/23/2025, 3:38:47 PM

Last enriched: 11/23/2025, 3:53:48 PM

Last updated: 11/23/2025, 6:01:01 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats