CVE-2025-4746: SQL Injection in Campcodes Sales and Inventory System
A vulnerability has been found in Campcodes Sales and Inventory System 1.0 and classified as critical. This vulnerability affects unknown code of the file /pages/purchase_delete.php. The manipulation of the argument pr_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4746 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Sales and Inventory System, specifically within the /pages/purchase_delete.php file. The vulnerability arises from improper sanitization or validation of the 'pr_id' parameter, which an attacker can manipulate to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands against the backend database without requiring any user interaction or privileges. The vulnerability is classified as medium severity with a CVSS 4.0 base score of 6.9, reflecting its network accessibility, lack of required authentication, and potential to impact confidentiality, integrity, and availability, albeit with limited scope and impact. Although no public exploit is currently known to be actively used in the wild, the disclosure of the vulnerability increases the risk of exploitation. SQL Injection vulnerabilities can lead to unauthorized data access, data modification, or even complete compromise of the database server, depending on the database privileges and configuration. Given that this vulnerability affects a sales and inventory management system, exploitation could result in unauthorized disclosure of sensitive business data, manipulation of inventory records, or disruption of sales operations.
Potential Impact
For European organizations using Campcodes Sales and Inventory System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of business-critical data. Attackers exploiting this flaw could access sensitive customer information, financial records, or inventory data, potentially leading to financial losses, reputational damage, and regulatory non-compliance, especially under GDPR requirements. The ability to remotely exploit the vulnerability without authentication increases the attack surface, making it easier for threat actors to target vulnerable systems. Disruption of sales and inventory processes could also impact operational continuity. Organizations in sectors such as retail, wholesale, and manufacturing that rely on this system for transaction processing and inventory management are particularly vulnerable. The medium severity rating suggests that while the vulnerability is serious, the overall impact may be mitigated by factors such as database permissions or network segmentation, but these cannot be assumed without proper assessment.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Apply any available patches or updates from Campcodes immediately once released. Since no patch links are currently provided, organizations should contact the vendor for remediation guidance. 2) Implement input validation and parameterized queries or prepared statements in the affected code to prevent SQL injection. 3) Restrict database user privileges to the minimum necessary, ensuring that the database account used by the application has limited rights, reducing potential damage from exploitation. 4) Employ Web Application Firewalls (WAFs) with rules designed to detect and block SQL injection attempts targeting the 'pr_id' parameter. 5) Conduct thorough code reviews and penetration testing focusing on SQL injection vectors within the application. 6) Monitor logs for suspicious activity related to the purchase_delete.php endpoint and unusual database queries. 7) If immediate patching is not possible, consider network-level controls to restrict access to the vulnerable application from untrusted sources. 8) Educate development and security teams about secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-4746: SQL Injection in Campcodes Sales and Inventory System
Description
A vulnerability has been found in Campcodes Sales and Inventory System 1.0 and classified as critical. This vulnerability affects unknown code of the file /pages/purchase_delete.php. The manipulation of the argument pr_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4746 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Sales and Inventory System, specifically within the /pages/purchase_delete.php file. The vulnerability arises from improper sanitization or validation of the 'pr_id' parameter, which an attacker can manipulate to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands against the backend database without requiring any user interaction or privileges. The vulnerability is classified as medium severity with a CVSS 4.0 base score of 6.9, reflecting its network accessibility, lack of required authentication, and potential to impact confidentiality, integrity, and availability, albeit with limited scope and impact. Although no public exploit is currently known to be actively used in the wild, the disclosure of the vulnerability increases the risk of exploitation. SQL Injection vulnerabilities can lead to unauthorized data access, data modification, or even complete compromise of the database server, depending on the database privileges and configuration. Given that this vulnerability affects a sales and inventory management system, exploitation could result in unauthorized disclosure of sensitive business data, manipulation of inventory records, or disruption of sales operations.
Potential Impact
For European organizations using Campcodes Sales and Inventory System 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of business-critical data. Attackers exploiting this flaw could access sensitive customer information, financial records, or inventory data, potentially leading to financial losses, reputational damage, and regulatory non-compliance, especially under GDPR requirements. The ability to remotely exploit the vulnerability without authentication increases the attack surface, making it easier for threat actors to target vulnerable systems. Disruption of sales and inventory processes could also impact operational continuity. Organizations in sectors such as retail, wholesale, and manufacturing that rely on this system for transaction processing and inventory management are particularly vulnerable. The medium severity rating suggests that while the vulnerability is serious, the overall impact may be mitigated by factors such as database permissions or network segmentation, but these cannot be assumed without proper assessment.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Apply any available patches or updates from Campcodes immediately once released. Since no patch links are currently provided, organizations should contact the vendor for remediation guidance. 2) Implement input validation and parameterized queries or prepared statements in the affected code to prevent SQL injection. 3) Restrict database user privileges to the minimum necessary, ensuring that the database account used by the application has limited rights, reducing potential damage from exploitation. 4) Employ Web Application Firewalls (WAFs) with rules designed to detect and block SQL injection attempts targeting the 'pr_id' parameter. 5) Conduct thorough code reviews and penetration testing focusing on SQL injection vectors within the application. 6) Monitor logs for suspicious activity related to the purchase_delete.php endpoint and unusual database queries. 7) If immediate patching is not possible, consider network-level controls to restrict access to the vulnerable application from untrusted sources. 8) Educate development and security teams about secure coding practices to prevent similar vulnerabilities in future releases.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-15T08:17:34.488Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebda8
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:17:55 PM
Last updated: 8/12/2025, 1:17:19 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.