CVE Alert: CVE-2025-11039 – Campcodes – Computer Sales and Inventory System

CVE-2025-11039

HIGHNo exploitation knownPoC observed

A security vulnerability has been detected in Campcodes Computer Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file /pages/us_edit1.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Computer Sales and Inventory System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-26T19:32:09.434Z
Updated
2025-09-26T19:53:00.334Z

AI Summary Analysis

Risk verdict

High risk: remote SQL injection with a publicly disclosed PoC and an automatable exploit path; treat as a priority for remediation.

Why this matters

An attacker can target an internet-facing instance to exfiltrate or modify data, or disrupt availability, without credentials or UI interaction. In a retail/inventory context, the attacker could access customer or stock data, alter records, or cause partial service outages, impacting trust and operations.

Most likely attack path

An external actor probes the vulnerable us_edit1.php endpoint, supplying crafted ID values to trigger SQL injection. With no privileges or user interaction required, the query manipulation can yield data leakage or data integrity impact, and could enable broader database access if the backend DB is reachable from the app tier.

Who is most exposed

Retailers and small businesses running Campcodes Computer Sales and Inventory System 1.0 with web-facing deployments are most at risk, especially where the web app sits on public networks or exposes admin-like pages to the internet.

Detection ideas

  • Web server/access logs showing requests to us_edit1.php with suspicious ID payloads (e.g., quotes, OR conditions, UNION SELECT).
  • Database or application logs containing SQL error messages or unusual syntax from the vulnerable endpoint.
  • WAF alerts targeting SQLi patterns on the affected path.
  • Repeated 500/500+ errors from the page following unusual input.
  • Unexplained data access patterns (unexpected table reads) or inventory changes.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to fixed version; if unavailable, implement strong input handling and migrate to parameterised queries or stored procedures.
  • Enforce compensating controls: web application firewall rules for SQLi patterns; disable or tightly restrict access to the vulnerable endpoint; network-level access controls to minimise exposure.
  • Improve authentication and least-privilege: ensure DB accounts used by the app have minimal privileges; restrict the vulnerable page to approved networks where possible.
  • Change-management: test patches in staging, then deploy with monitoring; review logs for indicators of exploitation during rollout.
  • If KEV or EPSS were known as high, escalate to Priority 1; current data does not confirm that, so treat as high-priority remediation.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.