CVE Alert: CVE-2025-10810 – Campcodes – Online Learning Management System
CVE-2025-10810
A vulnerability was detected in Campcodes Online Learning Management System 1.0. The impacted element is an unknown function of the file /admin/edit_user.php. Performing manipulation of the argument firstname results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.
AI Summary Analysis
Risk verdict
High risk: public exploit available for remote SQL injection in Campcodes OLMS; urgent remediation advised.
Why this matters
Exposed student/staff data could be queried or altered without authentication, risking data confidentiality and integrity. While CVSS indicates low CIA impact, the lack of auth and remote access elevates the attacker’s ability to automatedly probe and exfiltrate information or seed further compromise.
Most likely attack path
An attacker can target the admin edit_user.php endpoint over the network, injecting SQL via the firstname parameter. No user interaction or credentials are required, and successful exploitation can reveal or modify user data within the affected database (Scope Unchanged). The vulnerability lends itself to automated scanning and data exfiltration attempts, with limited lateral movement unless broader DB access is misconfigured.
Who is most exposed
Organisations hosting Campcodes OLMS online, particularly universities and training providers with internet-facing admin interfaces, are at risk—especially if they rely on the 1.0 release and have not applied any mitigations.
Detection ideas
- Logs showing unusual firstname payloads targeting edit_user.php
- Database errors or slow queries tied to user-edit operations
- Anomalous data reads/writes for user records
- spikes in 500/502 errors from the admin path
- WAF alerts for SQL injection patterns on /admin/edit_user.php
Mitigation and prioritisation
- Patch to a fixed version or apply vendor-supplied fixes immediately.
- If patching is delayed, implement WAF rules and input validation to block SQL payloads; disable direct admin access from the internet where feasible.
- Enforce parameterised queries, least-privilege DB accounts, and proper authentication/authorisation for admin endpoints.
- Harden configuration: restrict/admin IP whitelisting, remove or obfuscate legacy admin paths.
- Change-management: test in staging, then roll out with logging enhancements.
- If KEV true or EPSS ≥ 0.5, treat as priority 1.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.