Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14209: SQL Injection in Campcodes School File Management System

0
Medium
VulnerabilityCVE-2025-14209cvecve-2025-14209
Published: Mon Dec 08 2025 (12/08/2025, 01:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: School File Management System

Description

A weakness has been identified in Campcodes School File Management System 1.0. This impacts an unknown function of the file /update_query.php. This manipulation of the argument stud_id causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:52:05 UTC

Technical Analysis

CVE-2025-14209 identifies a SQL injection vulnerability in the Campcodes School File Management System version 1.0, specifically within the /update_query.php script. The vulnerability arises due to insufficient input validation or sanitization of the stud_id parameter, which is used in SQL queries without proper escaping or parameterization. This allows an unauthenticated remote attacker to craft malicious input that alters the intended SQL command, potentially enabling unauthorized data retrieval, modification, or deletion within the backend database. The vulnerability does not require user interaction or privileges, making it remotely exploitable over the network. The CVSS 4.0 base score of 6.9 reflects a medium severity, considering the attack vector is network-based, with low complexity, no privileges or user interaction needed, but with limited impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the public availability of an exploit increases the likelihood of attacks. The affected product is primarily used in educational environments to manage school files, which may contain sensitive student and staff information. The lack of official patches or mitigations at the time of publication necessitates immediate attention from administrators to prevent exploitation.

Potential Impact

The SQL injection vulnerability can lead to unauthorized access to sensitive student and school data, including personal information, grades, and administrative records. Attackers could manipulate or delete records, compromising data integrity and availability of the system. This may result in data breaches, reputational damage, regulatory non-compliance, and operational disruptions for educational institutions. Given the remote exploitability without authentication, attackers can launch automated attacks at scale, potentially affecting multiple organizations using the vulnerable software. The exposure of confidential student data could have legal and privacy implications, especially under data protection regulations such as GDPR or FERPA. The integrity of academic records could be undermined, affecting trust in the institution’s data management. While the impact scope is limited to organizations using Campcodes School File Management System 1.0, the risk is significant within that niche.

Mitigation Recommendations

Organizations should immediately audit their use of Campcodes School File Management System to identify affected instances running version 1.0. If possible, upgrade to a patched version once available from the vendor. In the absence of an official patch, implement input validation and parameterized queries in the /update_query.php script to sanitize the stud_id parameter and prevent SQL injection. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting this endpoint. Restrict network access to the management system to trusted IP addresses and enforce strong authentication mechanisms where feasible. Regularly monitor logs for suspicious query patterns or repeated failed attempts indicative of exploitation attempts. Conduct security assessments and penetration testing focused on injection flaws. Educate administrators on the risks and signs of SQL injection attacks. Finally, maintain regular backups of critical data to enable recovery in case of data corruption or deletion.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-07T08:09:25.316Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6936317e28b66c5f4ec304b9

Added to database: 12/8/2025, 2:01:34 AM

Last enriched: 2/24/2026, 10:52:05 PM

Last updated: 3/23/2026, 9:41:34 PM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses