Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15214: Cross Site Scripting in Campcodes Park Ticketing System

0
Medium
VulnerabilityCVE-2025-15214cvecve-2025-15214
Published: Tue Dec 30 2025 (12/30/2025, 01:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Park Ticketing System

Description

A vulnerability was found in Campcodes Park Ticketing System 1.0. The impacted element is the function save_pricing of the file admin_class.php. The manipulation of the argument name/ride results in cross site scripting. The attack may be performed from remote. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 01/06/2026, 22:47:12 UTC

Technical Analysis

CVE-2025-15214 identifies a cross-site scripting vulnerability in Campcodes Park Ticketing System version 1.0, specifically within the save_pricing function of the admin_class.php file. The vulnerability arises from improper sanitization of user-controlled input parameters 'name' and 'ride', which are processed without adequate validation or encoding. This flaw enables an attacker to inject malicious JavaScript code remotely, which executes in the context of an administrative user’s browser. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but demands high privileges (PR:H) and user interaction (UI:P), indicating that the attacker must have administrative access and trick the admin into triggering the payload. The vulnerability does not impact confidentiality, integrity, or availability directly (VC:N, VI:L, VA:N), but can lead to indirect consequences such as session hijacking or unauthorized actions performed by the admin. No authentication bypass or scope changes are involved. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The vulnerability is categorized as medium severity with a CVSS 4.8 score, reflecting moderate risk primarily due to the requirement for administrative privileges and user interaction. The lack of official patches or mitigation guidance from the vendor necessitates proactive defensive measures by affected organizations.

Potential Impact

For European organizations using Campcodes Park Ticketing System 1.0, this vulnerability poses a risk primarily to administrative users who manage pricing configurations. Successful exploitation could allow attackers to execute arbitrary scripts in the admin’s browser, potentially leading to session hijacking, unauthorized changes to ticket pricing, or redirection to malicious sites. This could disrupt business operations, damage reputation, and result in financial losses. Since the system is used in park ticketing, any compromise could impact customer trust and data integrity. The medium severity and requirement for high privileges limit the scope but do not eliminate risk, especially in environments with weak internal controls or insufficient user training. European amusement parks and tourism operators relying on this system may face targeted attacks aiming to disrupt services during peak seasons or exploit financial transactions. Additionally, regulatory compliance under GDPR requires organizations to protect administrative interfaces from such vulnerabilities to avoid penalties.

Mitigation Recommendations

1. Implement strict input validation and output encoding on the 'name' and 'ride' parameters within the save_pricing function to neutralize malicious scripts. 2. Restrict access to the administrative interface using network segmentation, VPNs, or IP whitelisting to limit exposure. 3. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 4. Conduct regular security training for administrators to recognize phishing or social engineering attempts that could trigger the XSS payload. 5. Monitor logs and web traffic for unusual activity related to the save_pricing function or admin interface. 6. If vendor patches become available, apply them promptly. 7. Consider deploying web application firewalls (WAF) with custom rules to detect and block XSS payloads targeting this vulnerability. 8. Review and harden session management to prevent session hijacking in case of successful script execution. 9. Perform periodic security assessments and code reviews of the ticketing system to identify and remediate similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T13:08:52.114Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450a3db813ff03e2be0d1

Added to database: 12/30/2025, 10:22:27 PM

Last enriched: 1/6/2026, 10:47:12 PM

Last updated: 2/4/2026, 5:14:11 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats