Skip to main content

CVE-2025-8190: SQL Injection in Campcodes Courier Management System

Medium
VulnerabilityCVE-2025-8190cvecve-2025-8190
Published: Sat Jul 26 2025 (07/26/2025, 13:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Courier Management System

Description

A vulnerability, which was classified as critical, has been found in Campcodes Courier Management System 1.0. This issue affects some unknown processing of the file /print_pdets.php. The manipulation of the argument ids leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/03/2025, 01:04:31 UTC

Technical Analysis

CVE-2025-8190 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Courier Management System, specifically within the /print_pdets.php file. The vulnerability arises from improper sanitization or validation of the 'ids' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. Although the CVSS 4.0 score is rated at 5.3 (medium severity), the vulnerability's characteristics—remote exploitability without authentication and direct impact on data integrity and confidentiality—make it a significant concern. The lack of a patch or mitigation guidance at the time of disclosure increases the risk, especially since the exploit details have been publicly disclosed, which could facilitate exploitation by threat actors. The vulnerability affects only version 1.0 of the product, which may limit the scope but still poses a critical risk to organizations using this specific version.

Potential Impact

For European organizations utilizing Campcodes Courier Management System 1.0, this vulnerability could lead to unauthorized access to sensitive courier and shipment data, including customer information, shipment details, and internal logistics data. Exploitation could result in data breaches, loss of data integrity, and potential disruption of courier operations, impacting business continuity and customer trust. Given the critical nature of courier services in supply chain and logistics sectors, especially in countries with high e-commerce activity, the impact could extend to financial losses and regulatory penalties under GDPR if personal data is compromised. Additionally, attackers could leverage this vulnerability to pivot within the network, escalating the threat beyond the affected application. The medium CVSS rating may underestimate the real-world impact due to the potential for data exfiltration and operational disruption.

Mitigation Recommendations

Organizations should immediately audit their use of Campcodes Courier Management System to determine if version 1.0 is deployed. If so, they should restrict access to the affected /print_pdets.php endpoint through network segmentation and web application firewalls (WAF) with rules to detect and block SQL injection patterns targeting the 'ids' parameter. Input validation and parameterized queries should be implemented by the vendor or through custom patches if possible. Monitoring and logging of database queries and web requests should be enhanced to detect anomalous activity. Until an official patch is released, organizations should consider disabling the vulnerable functionality if feasible or deploying compensating controls such as strict IP whitelisting and multi-factor authentication on management interfaces. Regular backups and incident response plans should be updated to handle potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-25T08:46:11.680Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6884d578ad5a09ad005fe6d8

Added to database: 7/26/2025, 1:17:44 PM

Last enriched: 8/3/2025, 1:04:31 AM

Last updated: 9/6/2025, 7:46:55 AM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats