CVE-2025-9786: SQL Injection in Campcodes Online Learning Management System
A vulnerability was found in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /teacher_signup.php. Performing manipulation of the argument firstname results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Other parameters might be affected as well.
AI Analysis
Technical Summary
CVE-2025-9786 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in the /teacher_signup.php file, specifically in the handling of the 'firstname' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. While the exact extent of affected parameters beyond 'firstname' is unknown, the presence of additional vulnerable inputs cannot be ruled out. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with the vector highlighting no privileges required, no user interaction, and low complexity of attack. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability could allow attackers to read or alter sensitive data stored in the LMS database. No patches or fixes have been publicly linked yet, and no known exploits in the wild have been reported, though a public exploit is available, increasing the risk of exploitation.
Potential Impact
For European organizations using Campcodes LMS version 1.0, this vulnerability poses a tangible risk to the confidentiality and integrity of sensitive educational data, including teacher and student information. Successful exploitation could lead to unauthorized data disclosure, data tampering, or disruption of LMS services, potentially impacting educational continuity and compliance with data protection regulations such as GDPR. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in institutions with internet-facing LMS deployments. The medium severity score reflects a moderate risk, but the presence of a public exploit elevates the urgency for mitigation. Organizations may face reputational damage, legal consequences, and operational disruptions if the vulnerability is exploited.
Mitigation Recommendations
European organizations should immediately assess their use of Campcodes LMS version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, organizations should implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'firstname' parameter and other input fields in /teacher_signup.php. Input validation and parameterized queries should be enforced at the application level to prevent injection. Network segmentation and restricting access to the LMS server to trusted IP ranges can reduce exposure. Regular monitoring of logs for suspicious SQL errors or unusual database queries is recommended to detect potential exploitation attempts. Additionally, organizations should review and tighten database user permissions to limit the impact of any successful injection. Finally, maintaining up-to-date backups of LMS data will aid in recovery if data integrity is compromised.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-9786: SQL Injection in Campcodes Online Learning Management System
Description
A vulnerability was found in Campcodes Online Learning Management System 1.0. Affected is an unknown function of the file /teacher_signup.php. Performing manipulation of the argument firstname results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Other parameters might be affected as well.
AI-Powered Analysis
Technical Analysis
CVE-2025-9786 is a SQL Injection vulnerability identified in version 1.0 of the Campcodes Online Learning Management System (LMS). The vulnerability exists in the /teacher_signup.php file, specifically in the handling of the 'firstname' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. While the exact extent of affected parameters beyond 'firstname' is unknown, the presence of additional vulnerable inputs cannot be ruled out. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with the vector highlighting no privileges required, no user interaction, and low complexity of attack. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability could allow attackers to read or alter sensitive data stored in the LMS database. No patches or fixes have been publicly linked yet, and no known exploits in the wild have been reported, though a public exploit is available, increasing the risk of exploitation.
Potential Impact
For European organizations using Campcodes LMS version 1.0, this vulnerability poses a tangible risk to the confidentiality and integrity of sensitive educational data, including teacher and student information. Successful exploitation could lead to unauthorized data disclosure, data tampering, or disruption of LMS services, potentially impacting educational continuity and compliance with data protection regulations such as GDPR. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially in institutions with internet-facing LMS deployments. The medium severity score reflects a moderate risk, but the presence of a public exploit elevates the urgency for mitigation. Organizations may face reputational damage, legal consequences, and operational disruptions if the vulnerability is exploited.
Mitigation Recommendations
European organizations should immediately assess their use of Campcodes LMS version 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, organizations should implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'firstname' parameter and other input fields in /teacher_signup.php. Input validation and parameterized queries should be enforced at the application level to prevent injection. Network segmentation and restricting access to the LMS server to trusted IP ranges can reduce exposure. Regular monitoring of logs for suspicious SQL errors or unusual database queries is recommended to detect potential exploitation attempts. Additionally, organizations should review and tighten database user permissions to limit the impact of any successful injection. Finally, maintaining up-to-date backups of LMS data will aid in recovery if data integrity is compromised.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-01T09:27:51.528Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b5c01cad5a09ad00d0a275
Added to database: 9/1/2025, 3:47:40 PM
Last enriched: 9/1/2025, 4:02:41 PM
Last updated: 9/3/2025, 5:26:17 PM
Views: 12
Related Threats
CVE-2025-9938: Stack-based Buffer Overflow in D-Link DI-8400
HighCVE-2025-9937: Improper Authorization in elunez eladmin
MediumCVE-2025-9936: Improper Authorization in fuyang_lipengjun platform
MediumCVE-2025-9935: Command Injection in TOTOLINK N600R
MediumCVE-2025-9934: Command Injection in TOTOLINK X5000R
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.