CVE-2025-4718: SQL Injection in Campcodes Sales and Inventory System
A vulnerability has been found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /pages/customer_add.php. The manipulation of the argument last leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI Analysis
Technical Summary
CVE-2025-4718 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Sales and Inventory System, specifically within the /pages/customer_add.php file. The vulnerability arises due to improper sanitization or validation of the 'last' argument, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even deletion. The vulnerability is classified with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low complexity, and no privileges or user interaction required. Although the exploit has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. The vulnerability may also affect other parameters, indicating a broader input validation issue within the application. Given the nature of sales and inventory systems, which typically store sensitive customer and transactional data, exploitation could compromise confidentiality and integrity of critical business information.
Potential Impact
For European organizations using Campcodes Sales and Inventory System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and inventory data. Successful exploitation could lead to unauthorized disclosure of personally identifiable information (PII), financial records, and inventory details, potentially resulting in regulatory non-compliance under GDPR. Data manipulation could disrupt business operations, cause financial losses, and damage organizational reputation. Since the attack can be launched remotely without authentication, attackers could exploit this vulnerability at scale, increasing the risk of widespread data breaches. Additionally, compromised systems could be leveraged as pivot points for further network intrusion or ransomware attacks, amplifying the overall impact on European enterprises.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates provided by Campcodes once available. In the absence of official patches, organizations should implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'last' parameter and other input fields in /pages/customer_add.php. Input validation and parameterized queries should be enforced at the application level to sanitize all user inputs rigorously. Conducting thorough code reviews and penetration testing can help identify and remediate similar injection points. Network segmentation and strict access controls can limit the exposure of the vulnerable system. Monitoring logs for unusual database query patterns or error messages related to SQL injection attempts is also recommended. Finally, organizations should prepare incident response plans to quickly address potential exploitation events.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden
CVE-2025-4718: SQL Injection in Campcodes Sales and Inventory System
Description
A vulnerability has been found in Campcodes Sales and Inventory System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /pages/customer_add.php. The manipulation of the argument last leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
AI-Powered Analysis
Technical Analysis
CVE-2025-4718 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Sales and Inventory System, specifically within the /pages/customer_add.php file. The vulnerability arises due to improper sanitization or validation of the 'last' argument, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw can be exploited to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or even deletion. The vulnerability is classified with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low complexity, and no privileges or user interaction required. Although the exploit has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. The vulnerability may also affect other parameters, indicating a broader input validation issue within the application. Given the nature of sales and inventory systems, which typically store sensitive customer and transactional data, exploitation could compromise confidentiality and integrity of critical business information.
Potential Impact
For European organizations using Campcodes Sales and Inventory System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and inventory data. Successful exploitation could lead to unauthorized disclosure of personally identifiable information (PII), financial records, and inventory details, potentially resulting in regulatory non-compliance under GDPR. Data manipulation could disrupt business operations, cause financial losses, and damage organizational reputation. Since the attack can be launched remotely without authentication, attackers could exploit this vulnerability at scale, increasing the risk of widespread data breaches. Additionally, compromised systems could be leveraged as pivot points for further network intrusion or ransomware attacks, amplifying the overall impact on European enterprises.
Mitigation Recommendations
Immediate mitigation should focus on applying patches or updates provided by Campcodes once available. In the absence of official patches, organizations should implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'last' parameter and other input fields in /pages/customer_add.php. Input validation and parameterized queries should be enforced at the application level to sanitize all user inputs rigorously. Conducting thorough code reviews and penetration testing can help identify and remediate similar injection points. Network segmentation and strict access controls can limit the exposure of the vulnerable system. Monitoring logs for unusual database query patterns or error messages related to SQL injection attempts is also recommended. Finally, organizations should prepare incident response plans to quickly address potential exploitation events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-15T06:52:14.295Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec17c
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/12/2025, 12:33:53 AM
Last updated: 10/7/2025, 1:44:44 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.