CVE Alert: CVE-2025-10444 – Campcodes – Online Job Finder System

CVE-2025-10444

HIGHNo exploitation known

A security flaw has been discovered in Campcodes Online Job Finder System 1.0. This issue affects some unknown processing of the file /advancesearch.php. Performing manipulation of the argument Username results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Online Job Finder System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-15T12:02:06.895Z
Updated
2025-09-15T12:02:06.895Z

AI Summary Analysis

Risk verdict

High risk; remote unauthenticated SQL injection with a publicly available exploit warrants urgent remediation.

Why this matters

Exploitation can expose or alter database contents, potentially leaking sensitive data. Even if impact on availability is moderate, attackers can exfiltrate data or corrupt records without user interaction, and a compromised DB user could be leveraged to pivot within the environment.

Most likely attack path

An attacker targets the Username parameter in advancesearch.php over the network, exploiting the SQL injection without any login. The vulnerability does not require user interaction, so any internet-accessible instance is at risk; database privileges will shape what can be read or modified and may enable further lateral movement if permissions are excessive.

Who is most exposed

Public-facing deployments of the web application, including internet-exposed hosting or shared hosting environments where advancesearch.php is accessible without authentication.

Detection ideas

  • Logs show unusual SQLi payloads in requests to advancesearch.php (e.g., tautologies, UNION SELECT).
  • Spikes of errors or database exceptions in application logs from that endpoint.
  • WAF/IPS alerts for SQL injection signatures targeting the Username field.
  • Repeated, diverse injection attempts from multiple IPs.
  • Abnormal query patterns or latency linked to that page.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a fixed version; ensure queries are parameterised.
  • Enforce least-privilege DB credentials and restrict database user rights.
  • Implement input validation and prepared statements; disable verbose database errors.
  • Deploy tuned WAF/IPS rules for SQL injection; monitor and alert on anomalies.
  • Plan patching in a change window with testing in staging; verify logs and post-patch traffic.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.