CVE Alert: CVE-2025-10809 – Campcodes – Online Learning Management System

CVE-2025-10809

HIGHNo exploitation knownPoC observed

A security vulnerability has been detected in Campcodes Online Learning Management System 1.0. The affected element is an unknown function of the file /admin/department.php. Such manipulation of the argument d leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Online Learning Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-22T18:02:06.971Z
Updated
2025-09-22T18:23:27.412Z

AI Summary Analysis

Risk verdict

Remote, unauthenticated SQL injection with a publicly disclosed PoC; high likelihood of exploitation and potential data exposure.

Why this matters

An attacker can manipulate the d parameter without user interaction to access or alter database contents. The vulnerability sits in an internet-facing admin workflow, risking disclosure of student records, credentials, and transactional data, with potential later data integrity or availability implications if the DB is misused.

Most likely attack path

attacker targets /admin/department.php, supplying crafted input to trigger SQL injection. No authentication or user interaction required, low complexity, and no privileges needed beyond the database user’s permissions. Successful exploitation could yield data leakage or unauthorized data modification, potentially enabling further access within the application or backend.

Who is most exposed

Institutions hosting the LMS openly or inadequately protected against SQLi on web-facing admin endpoints are most at risk; typical deployments in education settings with internet-exposed admin consoles.

Detection ideas

  • Unusual SQL errors or stack traces in application logs.
  • Anomalous query patterns or payloads in web server/database logs targeting department.php.
  • Spike in requests with unusual d parameter lengths or characters.
  • Logs showing data-dump-like responses or repeated access to admin endpoints from external IPs.
  • WAF/IDS alerts for SQL injection signatures.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to fixed version immediately; verify remediation in staging.
  • If patching isn’t available, implement parameterized queries/prepared statements and strict input validation for d.
  • Enable a web application firewall with SQLi signatures; restrict access to admin endpoints (IP allow-list, MFA for admins).
  • Harden database permissions for the LMS account; rotate credentials and monitor DB activity.
  • Implement robust change-management, testing, and backup validation prior to deployment.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.