CVE-2025-4718: SQL Injection in Campcodes Sales and Inventory System
A vulnerability has been found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /pages/customer_add.php. The manipulation of the argument last leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI Analysis
Technical Summary
CVE-2025-4718 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Sales and Inventory System, specifically within the /pages/customer_add.php file. The vulnerability arises due to improper sanitization or validation of the 'last' argument, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even deletion. The vulnerability is classified with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low complexity, and no privileges or user interaction required. Although the exploit has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. The vulnerability may also affect other parameters, indicating a broader input validation issue within the application. Given the nature of sales and inventory systems, which typically store sensitive customer and transactional data, exploitation could compromise confidentiality and integrity of critical business information.
Potential Impact
For European organizations using Campcodes Sales and Inventory System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and inventory data. Successful exploitation could lead to unauthorized disclosure of personally identifiable information (PII), financial records, and inventory details, potentially resulting in regulatory non-compliance under GDPR. Data manipulation could disrupt business operations, cause financial losses, and damage organizational reputation. Since the attack can be launched remotely without authentication, attackers could exploit this vulnerability at scale, increasing the risk of widespread data breaches. Additionally, compromised systems could be leveraged as pivot points for further network intrusion or ransomware attacks, amplifying the overall impact on European enterprises.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates provided by Campcodes once available. In the absence of official patches, organizations should implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'last' parameter and other input fields in /pages/customer_add.php. Input validation and parameterized queries should be enforced at the application level to sanitize all user inputs rigorously. Conducting thorough code reviews and penetration testing can help identify and remediate similar injection points. Network segmentation and strict access controls can limit the exposure of the vulnerable system. Monitoring logs for unusual database query patterns or error messages related to SQL injection attempts is also recommended. Finally, organizations should prepare incident response plans to quickly address potential exploitation events.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden
CVE-2025-4718: SQL Injection in Campcodes Sales and Inventory System
Description
A vulnerability has been found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /pages/customer_add.php. The manipulation of the argument last leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI-Powered Analysis
Technical Analysis
CVE-2025-4718 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Sales and Inventory System, specifically within the /pages/customer_add.php file. The vulnerability arises due to improper sanitization or validation of the 'last' argument, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even deletion. The vulnerability is classified with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low complexity, and no privileges or user interaction required. Although the exploit has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. The vulnerability may also affect other parameters, indicating a broader input validation issue within the application. Given the nature of sales and inventory systems, which typically store sensitive customer and transactional data, exploitation could compromise confidentiality and integrity of critical business information.
Potential Impact
For European organizations using Campcodes Sales and Inventory System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and inventory data. Successful exploitation could lead to unauthorized disclosure of personally identifiable information (PII), financial records, and inventory details, potentially resulting in regulatory non-compliance under GDPR. Data manipulation could disrupt business operations, cause financial losses, and damage organizational reputation. Since the attack can be launched remotely without authentication, attackers could exploit this vulnerability at scale, increasing the risk of widespread data breaches. Additionally, compromised systems could be leveraged as pivot points for further network intrusion or ransomware attacks, amplifying the overall impact on European enterprises.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates provided by Campcodes once available. In the absence of official patches, organizations should implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'last' parameter and other input fields in /pages/customer_add.php. Input validation and parameterized queries should be enforced at the application level to sanitize all user inputs rigorously. Conducting thorough code reviews and penetration testing can help identify and remediate similar injection points. Network segmentation and strict access controls can limit the exposure of the vulnerable system. Monitoring logs for unusual database query patterns or error messages related to SQL injection attempts is also recommended. Finally, organizations should prepare incident response plans to quickly address potential exploitation events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-15T06:52:14.295Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec17c
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/12/2025, 12:33:53 AM
Last updated: 8/12/2025, 7:22:31 AM
Views: 10
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.