CVE-2025-14664: SQL Injection in Campcodes Supplier Management System
A vulnerability was identified in Campcodes Supplier Management System 1.0. This issue affects some unknown processing of the file /admin/view_unit.php. The manipulation of the argument chkId[] leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-14664 is a SQL injection vulnerability identified in version 1.0 of the Campcodes Supplier Management System, specifically within the /admin/view_unit.php endpoint. The vulnerability arises from improper sanitization of the chkId[] parameter, which is used in SQL queries without adequate validation or parameterization. This allows an unauthenticated attacker to inject malicious SQL code remotely, potentially leading to unauthorized data access, data manipulation, or deletion. The vulnerability is exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no required privileges. The impact on confidentiality, integrity, and availability is low to moderate but still significant for sensitive supplier data. No official patches have been published yet, and while no active exploitation in the wild has been reported, a public exploit exists, which could facilitate attacks. The vulnerability affects only version 1.0 of the product, suggesting that organizations running this version are at risk. The lack of authentication requirement and the remote exploitability make this a critical concern for supply chain and procurement systems relying on Campcodes software.
Potential Impact
For European organizations, the exploitation of this vulnerability could lead to unauthorized disclosure of sensitive supplier and procurement data, manipulation of supplier records, or disruption of supplier management operations. This could result in financial losses, reputational damage, and regulatory non-compliance, especially under GDPR due to potential exposure of personal or business data. Supply chain disruptions could affect manufacturing, retail, and logistics sectors heavily reliant on accurate supplier data. The integrity compromise could lead to fraudulent supplier entries or altered purchase orders, impacting business operations. Availability impacts, while less severe, could still cause downtime or degraded service in supplier management workflows. Given the interconnected nature of supply chains in Europe, a successful attack could have cascading effects across multiple organizations and sectors.
Mitigation Recommendations
1. Immediate implementation of input validation and sanitization for the chkId[] parameter in /admin/view_unit.php, preferably by using prepared statements or parameterized queries to prevent SQL injection. 2. If patches become available from Campcodes, apply them promptly. 3. Restrict access to the /admin directory and sensitive endpoints via network segmentation and firewall rules to limit exposure. 4. Deploy Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities to block malicious payloads targeting this vulnerability. 5. Conduct thorough code reviews and security testing on all supplier management system components to identify and remediate similar injection flaws. 6. Monitor logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving supplier management system compromise. 8. Consider isolating the supplier management system from the internet or restricting access to trusted IPs only, reducing the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium
CVE-2025-14664: SQL Injection in Campcodes Supplier Management System
Description
A vulnerability was identified in Campcodes Supplier Management System 1.0. This issue affects some unknown processing of the file /admin/view_unit.php. The manipulation of the argument chkId[] leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14664 is a SQL injection vulnerability identified in version 1.0 of the Campcodes Supplier Management System, specifically within the /admin/view_unit.php endpoint. The vulnerability arises from improper sanitization of the chkId[] parameter, which is used in SQL queries without adequate validation or parameterization. This allows an unauthenticated attacker to inject malicious SQL code remotely, potentially leading to unauthorized data access, data manipulation, or deletion. The vulnerability is exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no required privileges. The impact on confidentiality, integrity, and availability is low to moderate but still significant for sensitive supplier data. No official patches have been published yet, and while no active exploitation in the wild has been reported, a public exploit exists, which could facilitate attacks. The vulnerability affects only version 1.0 of the product, suggesting that organizations running this version are at risk. The lack of authentication requirement and the remote exploitability make this a critical concern for supply chain and procurement systems relying on Campcodes software.
Potential Impact
For European organizations, the exploitation of this vulnerability could lead to unauthorized disclosure of sensitive supplier and procurement data, manipulation of supplier records, or disruption of supplier management operations. This could result in financial losses, reputational damage, and regulatory non-compliance, especially under GDPR due to potential exposure of personal or business data. Supply chain disruptions could affect manufacturing, retail, and logistics sectors heavily reliant on accurate supplier data. The integrity compromise could lead to fraudulent supplier entries or altered purchase orders, impacting business operations. Availability impacts, while less severe, could still cause downtime or degraded service in supplier management workflows. Given the interconnected nature of supply chains in Europe, a successful attack could have cascading effects across multiple organizations and sectors.
Mitigation Recommendations
1. Immediate implementation of input validation and sanitization for the chkId[] parameter in /admin/view_unit.php, preferably by using prepared statements or parameterized queries to prevent SQL injection. 2. If patches become available from Campcodes, apply them promptly. 3. Restrict access to the /admin directory and sensitive endpoints via network segmentation and firewall rules to limit exposure. 4. Deploy Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities to block malicious payloads targeting this vulnerability. 5. Conduct thorough code reviews and security testing on all supplier management system components to identify and remediate similar injection flaws. 6. Monitor logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving supplier management system compromise. 8. Consider isolating the supplier management system from the internet or restricting access to trusted IPs only, reducing the attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T13:31:27.731Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693ecdcc5f8758ba47d4695a
Added to database: 12/14/2025, 2:46:36 PM
Last enriched: 12/21/2025, 3:34:45 PM
Last updated: 2/3/2026, 8:18:27 AM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-34021: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-1167GST2
MediumCVE-2024-25579: OS command injection in ELECOM CO.,LTD. WRC-1167GS2-B
MediumCVE-2026-1592: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumCVE-2026-1591: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumCVE-2026-24935: CWE-295 Improper Certificate Validation in ASUSTOR ADM
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.