Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14582: Unrestricted Upload in campcodes Online Student Enrollment System

0
Medium
VulnerabilityCVE-2025-14582cvecve-2025-14582
Published: Fri Dec 12 2025 (12/12/2025, 22:02:07 UTC)
Source: CVE Database V5
Vendor/Project: campcodes
Product: Online Student Enrollment System

Description

A vulnerability was detected in campcodes Online Student Enrollment System 1.0. This affects an unknown function of the file /admin/index.php?page=user-profile. Performing a manipulation of the argument userphoto results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:57:40 UTC

Technical Analysis

CVE-2025-14582 is a vulnerability identified in version 1.0 of the campcodes Online Student Enrollment System, specifically affecting the /admin/index.php?page=user-profile component. The flaw arises from insufficient validation or restriction on the 'userphoto' parameter, allowing an authenticated user with high privileges to upload arbitrary files without restrictions. This unrestricted upload capability can be exploited remotely, potentially enabling an attacker to upload malicious scripts or executables that could be used to compromise the server environment. The vulnerability has a CVSS 4.0 base score of 5.1, indicating medium severity, with an attack vector of network (remote), low attack complexity, no user interaction, but requiring high privileges. The impact on confidentiality, integrity, and availability is limited but present, as the uploaded files could be leveraged for further attacks such as remote code execution or data tampering. No patches or official mitigations have been published yet, and no known exploits have been observed in the wild. The vulnerability is significant for organizations using this enrollment system, especially those with exposed administrative interfaces.

Potential Impact

The primary impact of CVE-2025-14582 is the potential for an authenticated attacker with high privileges to upload arbitrary files to the server, which could lead to further compromise such as remote code execution, data modification, or denial of service. Although the vulnerability requires high privilege authentication, the ability to upload unrestricted files increases the attack surface and risk of lateral movement or privilege escalation within the affected environment. Educational institutions using the campcodes Online Student Enrollment System may face data breaches, service disruptions, or reputational damage if exploited. The medium CVSS score reflects moderate risk, but the lack of user interaction and remote attack vector means exploitation could be automated or integrated into broader attack campaigns. Organizations without proper file upload validation or monitoring are particularly vulnerable.

Mitigation Recommendations

To mitigate CVE-2025-14582, organizations should immediately restrict access to the /admin/index.php?page=user-profile endpoint to trusted administrators only and enforce strong authentication and authorization controls. Implement strict server-side validation on the 'userphoto' parameter to allow only safe file types (e.g., images) and enforce size limits. Use file type verification techniques such as MIME type checking and content inspection rather than relying solely on file extensions. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts. Monitor logs for unusual file upload activity and scan uploaded files for malware. If possible, isolate the upload directory from executable permissions to prevent execution of uploaded files. Stay alert for official patches or updates from campcodes and apply them promptly once available. Conduct regular security assessments of the enrollment system and related infrastructure to detect and remediate similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-12T14:49:09.969Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693c958a5292e65bc612314c

Added to database: 12/12/2025, 10:22:02 PM

Last enriched: 2/24/2026, 10:57:40 PM

Last updated: 3/25/2026, 2:58:35 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses