Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15404: Unrestricted Upload in campcodes School File Management System

0
Medium
VulnerabilityCVE-2025-15404cvecve-2025-15404
Published: Thu Jan 01 2026 (01/01/2026, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: campcodes
Product: School File Management System

Description

A security vulnerability has been detected in campcodes School File Management System 1.0. The affected element is an unknown function of the file /save_file.php. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 01/01/2026, 13:58:50 UTC

Technical Analysis

The vulnerability identified as CVE-2025-15404 affects campcodes School File Management System version 1.0, specifically an unknown function within the /save_file.php file that handles file uploads. The flaw allows an attacker to perform unrestricted file uploads by manipulating the 'File' argument, bypassing any intended restrictions or validations. This vulnerability is remotely exploitable without user interaction and requires only limited privileges, meaning an attacker with some level of access to the system can upload arbitrary files, including potentially malicious scripts or executables. The unrestricted upload capability can lead to several attack vectors, such as remote code execution if the uploaded file is a web shell, data exfiltration, or denial of service by overwriting critical files. The vulnerability has been publicly disclosed but no known exploits have been observed in the wild yet. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and limited impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The lack of patches or vendor advisories at this time increases the urgency for organizations to implement compensating controls. This vulnerability is particularly critical in the context of educational institutions that rely on the campcodes system for managing sensitive student and staff files, as exploitation could compromise personal data and disrupt educational operations.

Potential Impact

For European organizations, especially educational institutions using campcodes School File Management System 1.0, this vulnerability poses a moderate risk. Successful exploitation could lead to unauthorized file uploads, enabling attackers to deploy malicious payloads such as web shells or ransomware, resulting in data breaches, system compromise, or operational disruption. Confidentiality of sensitive student and staff information could be compromised, violating GDPR and other data protection regulations. Integrity of stored files and availability of the file management system could also be affected, potentially disrupting educational services. Given the public disclosure and ease of exploitation, attackers may target vulnerable European schools or educational authorities, particularly those with limited cybersecurity resources. The impact is amplified in environments where network segmentation and access controls are weak, or where monitoring and incident response capabilities are limited.

Mitigation Recommendations

Organizations should immediately assess their use of campcodes School File Management System version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement strict input validation and sanitization on file upload parameters to restrict allowed file types, sizes, and content. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts. Restrict access to the /save_file.php endpoint using network segmentation and access control lists, limiting it to trusted users or IP ranges. Monitor logs for unusual file upload activity and establish alerting for potential exploitation attempts. Conduct regular security audits and penetration testing focused on file upload functionalities. Educate system administrators and users about the risks of unrestricted file uploads and enforce the principle of least privilege for system access. Finally, ensure backups of critical data are maintained securely to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T08:40:15.760Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69567a16db813ff03e61fb76

Added to database: 1/1/2026, 1:43:50 PM

Last enriched: 1/1/2026, 1:58:50 PM

Last updated: 1/8/2026, 7:21:28 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats