Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14877: SQL Injection in Campcodes Supplier Management System

0
Medium
VulnerabilityCVE-2025-14877cvecve-2025-14877
Published: Thu Dec 18 2025 (12/18/2025, 16:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Supplier Management System

Description

A vulnerability was identified in Campcodes Supplier Management System 1.0. This affects an unknown function of the file /admin/add_retailer.php. The manipulation of the argument cmbAreaCode leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:03:18 UTC

Technical Analysis

CVE-2025-14877 identifies a SQL injection vulnerability in Campcodes Supplier Management System version 1.0, located in the /admin/add_retailer.php script. The vulnerability arises from improper sanitization or validation of the cmbAreaCode parameter, which is directly incorporated into SQL queries. This allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially leading to unauthorized data retrieval, modification, or deletion within the underlying database. The vulnerability does not require any privileges or user interaction, making exploitation straightforward. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the ease of exploitation and the potential for partial impact on confidentiality, integrity, and availability. No patches or official fixes have been published yet, and while no active exploitation has been reported, a public exploit is available, increasing the likelihood of future attacks. The affected product is a supplier management system, which typically handles sensitive business data related to suppliers, contracts, and logistics, making the vulnerability particularly concerning for supply chain security. The vulnerability's remote nature and lack of authentication requirements make it a significant risk for organizations using this software without mitigation.

Potential Impact

The SQL injection vulnerability could allow attackers to extract sensitive supplier and business data, modify or delete records, or disrupt the supplier management system's operations. This could lead to data breaches exposing confidential supplier information, financial data, or contract details, potentially causing reputational damage and financial loss. Integrity violations could result in corrupted supplier records, affecting procurement and supply chain decisions. Availability impacts might arise if attackers execute destructive SQL commands, leading to denial of service or system downtime. Since the system is used for supplier management, exploitation could disrupt critical supply chain processes, affecting business continuity. The presence of a public exploit increases the risk of widespread attacks, especially in environments where the system is internet-facing or insufficiently protected. Organizations relying on Campcodes Supplier Management System 1.0 are at risk of targeted attacks aiming to gain unauthorized access or disrupt operations.

Mitigation Recommendations

Organizations should immediately assess their exposure to Campcodes Supplier Management System version 1.0, especially instances accessible over the internet or untrusted networks. Since no official patch is currently available, implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the cmbAreaCode parameter or /admin/add_retailer.php endpoint. 2) Restrict access to the administrative interface by IP whitelisting or VPN-only access to reduce exposure. 3) Conduct input validation and sanitization on the cmbAreaCode parameter, applying parameterized queries or prepared statements if possible. 4) Monitor logs for suspicious SQL injection patterns or unusual database queries. 5) Isolate the supplier management system within a segmented network zone to limit lateral movement in case of compromise. 6) Plan for an upgrade or patch deployment as soon as the vendor releases a fix. 7) Educate administrators about the vulnerability and encourage immediate response to any alerts related to this issue. These targeted actions go beyond generic advice and focus on reducing attack surface and detecting exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-18T11:09:09.949Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69442b344eb3efac36990c8a

Added to database: 12/18/2025, 4:26:28 PM

Last enriched: 2/24/2026, 11:03:18 PM

Last updated: 3/25/2026, 10:24:50 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses