Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14664: SQL Injection in Campcodes Supplier Management System

0
Medium
VulnerabilityCVE-2025-14664cvecve-2025-14664
Published: Sun Dec 14 2025 (12/14/2025, 14:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Supplier Management System

Description

A vulnerability was identified in Campcodes Supplier Management System 1.0. This issue affects some unknown processing of the file /admin/view_unit.php. The manipulation of the argument chkId[] leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 12/21/2025, 15:34:45 UTC

Technical Analysis

CVE-2025-14664 is a SQL injection vulnerability identified in version 1.0 of the Campcodes Supplier Management System, specifically within the /admin/view_unit.php endpoint. The vulnerability arises from improper sanitization of the chkId[] parameter, which is used in SQL queries without adequate validation or parameterization. This allows an unauthenticated attacker to inject malicious SQL code remotely, potentially leading to unauthorized data access, data manipulation, or deletion. The vulnerability is exploitable without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low complexity, and no required privileges. The impact on confidentiality, integrity, and availability is low to moderate but still significant for sensitive supplier data. No official patches have been published yet, and while no active exploitation in the wild has been reported, a public exploit exists, which could facilitate attacks. The vulnerability affects only version 1.0 of the product, suggesting that organizations running this version are at risk. The lack of authentication requirement and the remote exploitability make this a critical concern for supply chain and procurement systems relying on Campcodes software.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to unauthorized disclosure of sensitive supplier and procurement data, manipulation of supplier records, or disruption of supplier management operations. This could result in financial losses, reputational damage, and regulatory non-compliance, especially under GDPR due to potential exposure of personal or business data. Supply chain disruptions could affect manufacturing, retail, and logistics sectors heavily reliant on accurate supplier data. The integrity compromise could lead to fraudulent supplier entries or altered purchase orders, impacting business operations. Availability impacts, while less severe, could still cause downtime or degraded service in supplier management workflows. Given the interconnected nature of supply chains in Europe, a successful attack could have cascading effects across multiple organizations and sectors.

Mitigation Recommendations

1. Immediate implementation of input validation and sanitization for the chkId[] parameter in /admin/view_unit.php, preferably by using prepared statements or parameterized queries to prevent SQL injection. 2. If patches become available from Campcodes, apply them promptly. 3. Restrict access to the /admin directory and sensitive endpoints via network segmentation and firewall rules to limit exposure. 4. Deploy Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities to block malicious payloads targeting this vulnerability. 5. Conduct thorough code reviews and security testing on all supplier management system components to identify and remediate similar injection flaws. 6. Monitor logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving supplier management system compromise. 8. Consider isolating the supplier management system from the internet or restricting access to trusted IPs only, reducing the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T13:31:27.731Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693ecdcc5f8758ba47d4695a

Added to database: 12/14/2025, 2:46:36 PM

Last enriched: 12/21/2025, 3:34:45 PM

Last updated: 2/3/2026, 8:18:27 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats