CVE Alert: CVE-2025-10109 – Campcodes – Online Loan Management System

CVE-2025-10109

HIGHNo exploitation known

A vulnerability was determined in Campcodes Online Loan Management System 1.0. This issue affects some unknown processing of the file /ajax.php?action=delete_payment. Executing manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Online Loan Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-08T22:32:07.408Z
Updated
2025-09-08T22:32:07.408Z

AI Summary Analysis

Risk verdict

High risk; treat as priority 1 due to remote unauthenticated SQL injection with a publicly disclosed exploit.

Why this matters

An attacker can manipulate the ID parameter to run arbitrary SQL against the backend, potentially exposing or altering payment data. No user interaction or credentials are required, increasing the likelihood of automated probing and impact on financial records, customer trust, and regulatory posture.

Most likely attack path

Attacker targets the internet-facing /ajax.php?action=delete_payment endpoint, sending crafted ID values. With AV:N, PR:N and UI:N, exploitation requires no user action or prior access, enabling direct DB impact. Depending on DB permissions, data exfiltration or tampering of payments is plausible; lateral movement is limited by scope but could enable further data exposure if the same DB services other critical data.

Who is most exposed

Public-facing deployments of Campcodes Online Loan Management System (v1.0) on standard web stacks (often LAMP) in small to mid-sized organisations, where internet access is direct and application-level input handling may be inconsistent.

Detection ideas

  • Logs/IDS show requests to /ajax.php?action=delete_payment with unusual or crafted ID values.
  • SQLi payload patterns or database errors appearing in app or DB logs.
  • WAF alerts triggered by SQL injection attempts.
  • Unusual spikes in payment-delete events or failed queries.
  • Information_schema or system-table access attempts reflected in logs.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to fixed version; verify remediation in test env before prod rollout.
  • Enforce input validation and parameterised queries; restrict delete_payment usage or require authentication.
  • Enable WAF/IPS rules targeting SQL injection; deploy DB-level least-privilege accounts.
  • Implement change-control and rollback plans; schedule downtime if needed for patching.
  • Treat as Priority 1 (KEV/public exploit).

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.