Skip to main content

CVE-2025-9750: SQL Injection in Campcodes Online Learning Management System

Medium
VulnerabilityCVE-2025-9750cvecve-2025-9750
Published: Sun Aug 31 2025 (08/31/2025, 23:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Learning Management System

Description

A security flaw has been discovered in Campcodes Online Learning Management System 1.0. This vulnerability affects unknown code of the file /admin/login.php. The manipulation of the argument Username results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 08/31/2025, 23:32:43 UTC

Technical Analysis

CVE-2025-9750 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The flaw exists in the /admin/login.php file, specifically through manipulation of the 'Username' parameter. This vulnerability allows an unauthenticated attacker to remotely inject malicious SQL code into the backend database queries without requiring any user interaction or privileges. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the LMS data. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting the ease of exploitation (network accessible, no authentication or user interaction needed) but with limited impact scope (low to medium impact on confidentiality, integrity, and availability). Although no known exploits are currently observed in the wild, the public release of exploit code increases the risk of active exploitation. The LMS is typically used by educational institutions to manage course content, user accounts, and administrative functions, making it a valuable target for attackers seeking to disrupt educational services or steal sensitive user data.

Potential Impact

For European organizations, particularly educational institutions and training providers using Campcodes LMS version 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to student and staff personal information, course materials, and administrative credentials. This could result in data breaches violating GDPR regulations, leading to legal and financial penalties. Additionally, attackers could manipulate or delete critical educational data, disrupting learning activities and institutional operations. The remote and unauthenticated nature of the attack vector increases the likelihood of exploitation, potentially affecting multiple institutions if the LMS is widely deployed. The medium severity rating suggests that while the vulnerability is serious, the overall impact might be contained if proper network segmentation and monitoring are in place. However, the public availability of exploit code necessitates immediate attention to prevent compromise.

Mitigation Recommendations

Organizations should immediately assess their use of Campcodes LMS version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the /admin/login.php endpoint, especially focusing on the 'Username' parameter. 2) Restrict network access to the LMS admin interface by IP whitelisting or VPN access to reduce exposure. 3) Conduct input validation and sanitization at the application layer to neutralize malicious SQL payloads. 4) Monitor logs for unusual login attempts or SQL error messages indicative of injection attempts. 5) Regularly back up LMS databases and test restoration procedures to minimize data loss impact. 6) Educate administrators about the vulnerability and encourage prompt reporting of suspicious activities. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-31T08:16:36.362Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b4d814ad5a09ad00c3cecf

Added to database: 8/31/2025, 11:17:40 PM

Last enriched: 8/31/2025, 11:32:43 PM

Last updated: 9/1/2025, 1:04:40 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats