Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15214: Cross Site Scripting in Campcodes Park Ticketing System

0
Medium
VulnerabilityCVE-2025-15214cvecve-2025-15214
Published: Tue Dec 30 2025 (12/30/2025, 01:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Park Ticketing System

Description

A vulnerability was found in Campcodes Park Ticketing System 1.0. The impacted element is the function save_pricing of the file admin_class.php. The manipulation of the argument name/ride results in cross site scripting. The attack may be performed from remote. The exploit has been made public and could be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:38:24 UTC

Technical Analysis

CVE-2025-15214 identifies a cross-site scripting (XSS) vulnerability in Campcodes Park Ticketing System version 1.0, specifically in the save_pricing function of the admin_class.php file. The vulnerability arises from improper sanitization of the 'name' and 'ride' parameters, which are susceptible to malicious script injection. An attacker can remotely exploit this flaw by crafting a specially designed request that manipulates these parameters, causing the system to execute arbitrary JavaScript in the context of an administrative user's browser. This can lead to session hijacking, credential theft, or unauthorized actions performed with the privileges of the admin user. The vulnerability does not require prior authentication but does require user interaction, such as an admin clicking a malicious link or loading a crafted page. The CVSS 4.8 score reflects a medium severity level, considering the ease of remote exploitation but the need for user interaction and the limited scope of impact on confidentiality and integrity. No patches have been officially released yet, and no active exploits have been observed in the wild, although proof-of-concept code is publicly available. The vulnerability highlights the importance of proper input validation and output encoding in web applications, especially those handling administrative functions in critical infrastructure like ticketing systems for parks and events.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of administrative sessions within the Campcodes Park Ticketing System. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of an admin user, potentially leading to session hijacking, theft of sensitive information, or unauthorized modification of ticket pricing and ride configurations. This could disrupt park operations, cause financial losses, and damage customer trust. While availability is not directly affected, indirect impacts such as administrative account compromise could lead to further attacks or downtime. Organizations relying on this system, especially those managing large-scale amusement parks or events, face risks of operational disruption and reputational damage. The medium severity rating reflects the need for user interaction and the limited scope of affected components, but the exposure of administrative functions to remote exploitation increases the threat level. Without timely mitigation, attackers could leverage this vulnerability to gain footholds in critical infrastructure environments.

Mitigation Recommendations

To mitigate CVE-2025-15214, organizations should implement the following specific measures: 1) Apply strict input validation and sanitization on the 'name' and 'ride' parameters within the save_pricing function to neutralize malicious scripts before processing. 2) Employ context-aware output encoding to ensure any user-supplied data rendered in the admin interface is safe from injection attacks. 3) Restrict administrative access to trusted networks or VPNs to reduce exposure to remote attackers. 4) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the admin interface. 5) Monitor administrative logs and network traffic for unusual activity indicative of exploitation attempts. 6) Educate administrative users about phishing and social engineering risks to reduce the chance of user interaction with malicious payloads. 7) If possible, isolate the ticketing system's administrative interface from public internet access. 8) Engage with the vendor for official patches or updates and prioritize their deployment once available. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameters and the administrative context of the system.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T13:08:52.114Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450a3db813ff03e2be0d1

Added to database: 12/30/2025, 10:22:27 PM

Last enriched: 2/24/2026, 10:38:24 PM

Last updated: 3/26/2026, 9:15:08 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses