CVE-2025-8190: SQL Injection in Campcodes Courier Management System
A vulnerability, which was classified as critical, has been found in Campcodes Courier Management System 1.0. This issue affects some unknown processing of the file /print_pdets.php. The manipulation of the argument ids leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8190 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Courier Management System, specifically within the /print_pdets.php file. The vulnerability arises from improper sanitization or validation of the 'ids' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. Although the CVSS 4.0 score is rated at 5.3 (medium severity), the vulnerability's characteristics—remote exploitability without authentication and direct impact on data integrity and confidentiality—make it a significant concern. The lack of a patch or mitigation guidance at the time of disclosure increases the risk, especially since the exploit details have been publicly disclosed, which could facilitate exploitation by threat actors. The vulnerability affects only version 1.0 of the product, which may limit the scope but still poses a critical risk to organizations using this specific version.
Potential Impact
For European organizations utilizing Campcodes Courier Management System 1.0, this vulnerability could lead to unauthorized access to sensitive courier and shipment data, including customer information, shipment details, and internal logistics data. Exploitation could result in data breaches, loss of data integrity, and potential disruption of courier operations, impacting business continuity and customer trust. Given the critical nature of courier services in supply chain and logistics sectors, especially in countries with high e-commerce activity, the impact could extend to financial losses and regulatory penalties under GDPR if personal data is compromised. Additionally, attackers could leverage this vulnerability to pivot within the network, escalating the threat beyond the affected application. The medium CVSS rating may underestimate the real-world impact due to the potential for data exfiltration and operational disruption.
Mitigation Recommendations
Organizations should immediately audit their use of Campcodes Courier Management System to determine if version 1.0 is deployed. If so, they should restrict access to the affected /print_pdets.php endpoint through network segmentation and web application firewalls (WAF) with rules to detect and block SQL injection patterns targeting the 'ids' parameter. Input validation and parameterized queries should be implemented by the vendor or through custom patches if possible. Monitoring and logging of database queries and web requests should be enhanced to detect anomalous activity. Until an official patch is released, organizations should consider disabling the vulnerable functionality if feasible or deploying compensating controls such as strict IP whitelisting and multi-factor authentication on management interfaces. Regular backups and incident response plans should be updated to handle potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-8190: SQL Injection in Campcodes Courier Management System
Description
A vulnerability, which was classified as critical, has been found in Campcodes Courier Management System 1.0. This issue affects some unknown processing of the file /print_pdets.php. The manipulation of the argument ids leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8190 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Courier Management System, specifically within the /print_pdets.php file. The vulnerability arises from improper sanitization or validation of the 'ids' parameter, which allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. Although the CVSS 4.0 score is rated at 5.3 (medium severity), the vulnerability's characteristics—remote exploitability without authentication and direct impact on data integrity and confidentiality—make it a significant concern. The lack of a patch or mitigation guidance at the time of disclosure increases the risk, especially since the exploit details have been publicly disclosed, which could facilitate exploitation by threat actors. The vulnerability affects only version 1.0 of the product, which may limit the scope but still poses a critical risk to organizations using this specific version.
Potential Impact
For European organizations utilizing Campcodes Courier Management System 1.0, this vulnerability could lead to unauthorized access to sensitive courier and shipment data, including customer information, shipment details, and internal logistics data. Exploitation could result in data breaches, loss of data integrity, and potential disruption of courier operations, impacting business continuity and customer trust. Given the critical nature of courier services in supply chain and logistics sectors, especially in countries with high e-commerce activity, the impact could extend to financial losses and regulatory penalties under GDPR if personal data is compromised. Additionally, attackers could leverage this vulnerability to pivot within the network, escalating the threat beyond the affected application. The medium CVSS rating may underestimate the real-world impact due to the potential for data exfiltration and operational disruption.
Mitigation Recommendations
Organizations should immediately audit their use of Campcodes Courier Management System to determine if version 1.0 is deployed. If so, they should restrict access to the affected /print_pdets.php endpoint through network segmentation and web application firewalls (WAF) with rules to detect and block SQL injection patterns targeting the 'ids' parameter. Input validation and parameterized queries should be implemented by the vendor or through custom patches if possible. Monitoring and logging of database queries and web requests should be enhanced to detect anomalous activity. Until an official patch is released, organizations should consider disabling the vulnerable functionality if feasible or deploying compensating controls such as strict IP whitelisting and multi-factor authentication on management interfaces. Regular backups and incident response plans should be updated to handle potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-25T08:46:11.680Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6884d578ad5a09ad005fe6d8
Added to database: 7/26/2025, 1:17:44 PM
Last enriched: 8/3/2025, 1:04:31 AM
Last updated: 9/6/2025, 7:46:55 AM
Views: 31
Related Threats
CVE-2025-58446: CWE-770: Allocation of Resources Without Limits or Throttling in mlc-ai xgrammar
MediumCVE-2025-58438: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in jjjake internetarchive
CriticalCVE-2025-0034: CWE-787 Out-of-bounds Write in AMD AMD Instinct™ MI300X
MediumCVE-2025-0032: CWE-459 Incomplete Cleanup in AMD AMD EPYC™ 9005 Series Processors
HighCVE-2025-0009: CWE-476 NULL Pointer Dereference in AMD AMD Ryzen™ 7035 Series Processor with Radeon™ Graphics
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.