Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15404: Unrestricted Upload in campcodes School File Management System

0
Medium
VulnerabilityCVE-2025-15404cvecve-2025-15404
Published: Thu Jan 01 2026 (01/01/2026, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: campcodes
Product: School File Management System

Description

A security vulnerability has been detected in campcodes School File Management System 1.0. The affected element is an unknown function of the file /save_file.php. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 23:21:38 UTC

Technical Analysis

CVE-2025-15404 identifies a security vulnerability in campcodes School File Management System version 1.0, specifically in the /save_file.php script. The vulnerability arises from improper validation of the 'File' argument, allowing an attacker to perform unrestricted file uploads. This flaw enables remote attackers to upload arbitrary files, potentially including malicious scripts or executables, without requiring user interaction and with only low-level privileges. The vulnerability does not require authentication (AT:N) but does require low privileges (PR:L), indicating some form of limited access is necessary. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability could be exploited to execute arbitrary code, deface websites, or disrupt services if the uploaded files are executed or accessed by the system. No public exploits have been reported yet, but the disclosure of the vulnerability increases the risk of exploitation. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps by administrators. The vulnerability affects only version 1.0 of the product, which is a specialized file management system used primarily in educational environments to manage school files and documents. The attack vector is network-based (AV:N), and no user interaction is needed (UI:N), making it easier to exploit remotely.

Potential Impact

The unrestricted file upload vulnerability can have significant consequences for organizations using the affected software. Attackers could upload malicious files such as web shells or scripts, enabling remote code execution, data theft, or system compromise. This could lead to unauthorized access to sensitive student or staff data, disruption of school operations, and potential reputational damage. The medium CVSS score reflects partial impact on confidentiality, integrity, and availability, but the actual impact depends on how the uploaded files are handled by the system and the underlying server configuration. If the server executes uploaded files or allows access to them, the risk escalates to critical. Educational institutions, often with limited cybersecurity resources, may be particularly vulnerable. The exploitability without user interaction and remotely increases the threat surface. While no known exploits are currently active in the wild, the public disclosure may prompt attackers to develop exploits, increasing the urgency for mitigation.

Mitigation Recommendations

Administrators should immediately implement strict file upload validation controls, including restricting allowed file types to safe formats (e.g., PDFs, images) and blocking executable or script files. Employ server-side checks to verify file content and use file integrity monitoring to detect unauthorized uploads. Configure web servers to prevent execution of uploaded files by placing upload directories outside the web root or disabling script execution in those directories. Monitor logs for suspicious upload activity and unusual file access patterns. Apply principle of least privilege to the application and server accounts to limit damage if exploitation occurs. Since no official patches are currently available, consider temporary workarounds such as disabling the upload functionality if feasible. Engage with the vendor for updates and patches, and plan for timely deployment once available. Conduct regular security assessments and penetration testing to identify similar vulnerabilities. Educate staff about the risks and signs of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T08:40:15.760Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69567a16db813ff03e61fb76

Added to database: 1/1/2026, 1:43:50 PM

Last enriched: 2/23/2026, 11:21:38 PM

Last updated: 3/25/2026, 2:24:53 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses