Skip to main content

CVE-2025-7470: Unrestricted Upload in Campcodes Sales and Inventory System

Medium
VulnerabilityCVE-2025-7470cvecve-2025-7470
Published: Sat Jul 12 2025 (07/12/2025, 11:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Sales and Inventory System

Description

A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been classified as critical. Affected is an unknown function of the file /pages/product_add.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/19/2025, 21:00:07 UTC

Technical Analysis

CVE-2025-7470 is a critical vulnerability identified in version 1.0 of the Campcodes Sales and Inventory System, specifically within the /pages/product_add.php file. The vulnerability arises from improper handling of the 'image' argument, which allows an attacker to perform an unrestricted file upload. This means that an attacker can remotely upload arbitrary files, potentially including malicious scripts or executables, without any authentication or user interaction. The vulnerability is exploitable over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has low complexity (AC:L). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant compromise. Since the uploaded files can be executed or used to manipulate the system, this can lead to remote code execution, data tampering, or denial of service. Although no known exploits are currently in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of exploitation but limited direct impact on core system confidentiality or integrity without further chaining of exploits. The vulnerability affects only version 1.0 of the product, and no patches or mitigations have been officially released yet.

Potential Impact

For European organizations using Campcodes Sales and Inventory System 1.0, this vulnerability poses a significant risk. An attacker exploiting this flaw can upload malicious files remotely, potentially leading to unauthorized access, data breaches, or disruption of sales and inventory operations. This can result in financial losses, reputational damage, and regulatory non-compliance, especially under GDPR requirements for protecting personal and business data. The ability to upload arbitrary files without authentication increases the attack surface, making it easier for cybercriminals to compromise systems. Given that sales and inventory systems often integrate with other business-critical applications, the compromise could cascade, affecting supply chain management and customer data integrity. The lack of known active exploits currently reduces immediate risk but the public disclosure means attackers can develop exploits rapidly. Organizations in sectors with high reliance on inventory management, such as retail, manufacturing, and logistics, are particularly vulnerable.

Mitigation Recommendations

Since no official patches are available, European organizations should implement immediate compensating controls. First, restrict access to the /pages/product_add.php endpoint via network segmentation and firewall rules, limiting it to trusted internal IP addresses only. Implement web application firewalls (WAFs) with rules to detect and block suspicious file upload patterns and payloads. Conduct thorough input validation and sanitization on the 'image' parameter to prevent upload of executable or script files. Disable execution permissions on directories where uploaded files are stored to prevent execution of malicious files. Monitor logs for unusual upload activity and implement intrusion detection systems (IDS) to alert on potential exploitation attempts. Organizations should also consider temporarily disabling the image upload feature if feasible until a patch is released. Finally, maintain regular backups and have an incident response plan ready to mitigate potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T12:01:07.783Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687243f7a83201eaacb419a9

Added to database: 7/12/2025, 11:16:07 AM

Last enriched: 7/19/2025, 9:00:07 PM

Last updated: 8/22/2025, 7:58:05 AM

Views: 30

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats