CVE-2025-13555: SQL Injection in Campcodes School File Management System
A vulnerability was detected in Campcodes School File Management System 1.0. Affected is an unknown function of the file /index.php of the component Login. Performing manipulation of the argument stud_no results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-13555 identifies a SQL injection vulnerability in Campcodes School File Management System version 1.0, specifically within the Login component's /index.php file. The vulnerability arises from improper sanitization of the 'stud_no' parameter, which is susceptible to SQL injection attacks. An attacker can remotely manipulate this parameter to inject malicious SQL queries, potentially extracting sensitive data, modifying records, or disrupting database operations. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely over the network. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of exploitation. The affected product is primarily used in educational environments for managing school files, making student data and administrative records vulnerable. The lack of patches or official remediation guidance increases the urgency for organizations to implement mitigations such as input validation and prepared statements. The vulnerability highlights the need for secure coding practices in educational software to protect sensitive student and institutional data from unauthorized access and manipulation.
Potential Impact
The SQL injection vulnerability in Campcodes School File Management System can have significant impacts on European educational organizations. Exploitation could lead to unauthorized disclosure of sensitive student and staff data, including personal identification and academic records, violating data protection regulations such as GDPR. Data integrity could be compromised by unauthorized modification or deletion of records, potentially disrupting school operations and administrative processes. Availability of the system could also be affected if attackers execute destructive queries or cause database corruption. The remote, unauthenticated nature of the vulnerability increases the risk of widespread exploitation, especially in environments where the system is exposed to the internet or insufficiently segmented networks. This could lead to reputational damage, regulatory penalties, and operational downtime. European schools and educational authorities relying on this system must consider the risk of targeted attacks or opportunistic exploitation by cybercriminals seeking to access or manipulate educational data.
Mitigation Recommendations
To mitigate CVE-2025-13555, organizations should immediately implement input validation and sanitization on the 'stud_no' parameter to prevent injection of malicious SQL code. Employing parameterized queries or prepared statements in the Login component will effectively neutralize SQL injection attempts. Network-level protections such as web application firewalls (WAFs) can be configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Restricting external access to the School File Management System by placing it behind VPNs or internal networks reduces exposure. Organizations should monitor logs for suspicious activity related to the 'stud_no' parameter and unusual database queries. Since no official patches are currently available, consider engaging with the vendor for updates or applying custom patches. Additionally, conducting a thorough security audit of the application for other injection flaws and enforcing secure coding standards will help prevent similar vulnerabilities. Regular backups of the database should be maintained to enable recovery in case of data corruption or deletion.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-13555: SQL Injection in Campcodes School File Management System
Description
A vulnerability was detected in Campcodes School File Management System 1.0. Affected is an unknown function of the file /index.php of the component Login. Performing manipulation of the argument stud_no results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13555 identifies a SQL injection vulnerability in Campcodes School File Management System version 1.0, specifically within the Login component's /index.php file. The vulnerability arises from improper sanitization of the 'stud_no' parameter, which is susceptible to SQL injection attacks. An attacker can remotely manipulate this parameter to inject malicious SQL queries, potentially extracting sensitive data, modifying records, or disrupting database operations. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely over the network. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, and no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of exploitation. The affected product is primarily used in educational environments for managing school files, making student data and administrative records vulnerable. The lack of patches or official remediation guidance increases the urgency for organizations to implement mitigations such as input validation and prepared statements. The vulnerability highlights the need for secure coding practices in educational software to protect sensitive student and institutional data from unauthorized access and manipulation.
Potential Impact
The SQL injection vulnerability in Campcodes School File Management System can have significant impacts on European educational organizations. Exploitation could lead to unauthorized disclosure of sensitive student and staff data, including personal identification and academic records, violating data protection regulations such as GDPR. Data integrity could be compromised by unauthorized modification or deletion of records, potentially disrupting school operations and administrative processes. Availability of the system could also be affected if attackers execute destructive queries or cause database corruption. The remote, unauthenticated nature of the vulnerability increases the risk of widespread exploitation, especially in environments where the system is exposed to the internet or insufficiently segmented networks. This could lead to reputational damage, regulatory penalties, and operational downtime. European schools and educational authorities relying on this system must consider the risk of targeted attacks or opportunistic exploitation by cybercriminals seeking to access or manipulate educational data.
Mitigation Recommendations
To mitigate CVE-2025-13555, organizations should immediately implement input validation and sanitization on the 'stud_no' parameter to prevent injection of malicious SQL code. Employing parameterized queries or prepared statements in the Login component will effectively neutralize SQL injection attempts. Network-level protections such as web application firewalls (WAFs) can be configured to detect and block SQL injection patterns targeting the vulnerable endpoint. Restricting external access to the School File Management System by placing it behind VPNs or internal networks reduces exposure. Organizations should monitor logs for suspicious activity related to the 'stud_no' parameter and unusual database queries. Since no official patches are currently available, consider engaging with the vendor for updates or applying custom patches. Additionally, conducting a thorough security audit of the application for other injection flaws and enforcing secure coding standards will help prevent similar vulnerabilities. Regular backups of the database should be maintained to enable recovery in case of data corruption or deletion.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-22T15:29:47.289Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69232a874f4cb01c4da9aee5
Added to database: 11/23/2025, 3:38:47 PM
Last enriched: 11/30/2025, 3:54:17 PM
Last updated: 1/8/2026, 10:24:03 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21874: CWE-772: Missing Release of Resource after Effective Lifetime in zauberzeug nicegui
MediumCVE-2026-21873: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
HighCVE-2026-21872: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-21871: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-21894: CWE-290: Authentication Bypass by Spoofing in n8n-io n8n
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.