CVE-2025-13555: SQL Injection in Campcodes School File Management System
A vulnerability was detected in Campcodes School File Management System 1.0. Affected is an unknown function of the file /index.php of the component Login. Performing manipulation of the argument stud_no results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-13555 identifies a SQL injection vulnerability in version 1.0 of the Campcodes School File Management System, specifically within the login component's /index.php file. The vulnerability arises from improper sanitization of the stud_no parameter, which can be manipulated remotely without authentication or user interaction to inject malicious SQL queries. This flaw allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data retrieval, modification, or deletion. The CVSS 4.0 base score is 6.9 (medium), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, a public exploit is available, increasing the risk of attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The lack of secure coding practices in input validation and parameterized queries is the root cause. This vulnerability is critical for environments managing sensitive student data, as it can lead to data breaches or operational disruption.
Potential Impact
For European organizations, particularly educational institutions using Campcodes School File Management System 1.0, this vulnerability poses a significant risk of unauthorized access to sensitive student records and administrative data. Exploitation can result in data leakage, data tampering, or denial of service, undermining confidentiality, integrity, and availability of critical educational data. Given the remote and unauthenticated nature of the attack, threat actors can easily target vulnerable systems over the internet. This can lead to reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The medium severity score indicates a moderate but tangible risk, especially in environments lacking compensating controls. The presence of a public exploit increases the likelihood of opportunistic attacks. Organizations may also face challenges in incident response and recovery if backups or monitoring are insufficient. Overall, the vulnerability threatens data privacy and system reliability in European educational sectors.
Mitigation Recommendations
Immediate mitigation should focus on applying vendor-provided patches once available. In the absence of official patches, organizations should implement strict input validation on the stud_no parameter, ensuring only expected numeric or alphanumeric formats are accepted. Employing parameterized SQL queries or prepared statements can prevent injection attacks by separating code from data. Web application firewalls (WAFs) can be configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Regular security audits and code reviews should be conducted to identify similar vulnerabilities. Network segmentation and limiting external access to the management system can reduce exposure. Monitoring logs for unusual database queries or repeated failed login attempts can help detect exploitation attempts early. Lastly, organizations should maintain up-to-date backups and have an incident response plan tailored to data breach scenarios involving educational data.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-13555: SQL Injection in Campcodes School File Management System
Description
A vulnerability was detected in Campcodes School File Management System 1.0. Affected is an unknown function of the file /index.php of the component Login. Performing manipulation of the argument stud_no results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13555 identifies a SQL injection vulnerability in version 1.0 of the Campcodes School File Management System, specifically within the login component's /index.php file. The vulnerability arises from improper sanitization of the stud_no parameter, which can be manipulated remotely without authentication or user interaction to inject malicious SQL queries. This flaw allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data retrieval, modification, or deletion. The CVSS 4.0 base score is 6.9 (medium), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and partial impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, a public exploit is available, increasing the risk of attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. The lack of secure coding practices in input validation and parameterized queries is the root cause. This vulnerability is critical for environments managing sensitive student data, as it can lead to data breaches or operational disruption.
Potential Impact
For European organizations, particularly educational institutions using Campcodes School File Management System 1.0, this vulnerability poses a significant risk of unauthorized access to sensitive student records and administrative data. Exploitation can result in data leakage, data tampering, or denial of service, undermining confidentiality, integrity, and availability of critical educational data. Given the remote and unauthenticated nature of the attack, threat actors can easily target vulnerable systems over the internet. This can lead to reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The medium severity score indicates a moderate but tangible risk, especially in environments lacking compensating controls. The presence of a public exploit increases the likelihood of opportunistic attacks. Organizations may also face challenges in incident response and recovery if backups or monitoring are insufficient. Overall, the vulnerability threatens data privacy and system reliability in European educational sectors.
Mitigation Recommendations
Immediate mitigation should focus on applying vendor-provided patches once available. In the absence of official patches, organizations should implement strict input validation on the stud_no parameter, ensuring only expected numeric or alphanumeric formats are accepted. Employing parameterized SQL queries or prepared statements can prevent injection attacks by separating code from data. Web application firewalls (WAFs) can be configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Regular security audits and code reviews should be conducted to identify similar vulnerabilities. Network segmentation and limiting external access to the management system can reduce exposure. Monitoring logs for unusual database queries or repeated failed login attempts can help detect exploitation attempts early. Lastly, organizations should maintain up-to-date backups and have an incident response plan tailored to data breach scenarios involving educational data.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:29:47.289Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69232a874f4cb01c4da9aee5
Added to database: 11/23/2025, 3:38:47 PM
Last enriched: 11/23/2025, 3:53:48 PM
Last updated: 11/23/2025, 6:01:01 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13561: SQL Injection in SourceCodester Company Website CMS
MediumCVE-2025-54515: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Versal™ Adaptive SoC Devices
LowCVE-2025-48507: CWE-1284 Improper Validation of Specified Quantity in Input in AMD Kria™ SOM
HighCVE-2025-13560: SQL Injection in SourceCodester Company Website CMS
MediumCVE-2025-13557: SQL Injection in Campcodes Online Polling System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.