CVE Alert: CVE-2025-11422 – Campcodes – Advanced Online Voting Management System

CVE-2025-11422

HIGHNo exploitation known

A vulnerability has been found in Campcodes Advanced Online Voting Management System 1.0. The impacted element is an unknown function of the file /admin/login.php. Such manipulation of the argument Username leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Advanced Online Voting Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-08T01:32:06.033Z
Updated
2025-10-08T01:32:06.033Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection on the login endpoint with public exploit exposure.

Why this matters

Public disclosure increases automated probing and abuse. In a voting management context, an attacker could access user data, potentially bypass authentication and influence results, eroding trust and complicating regulatory compliance.

Most likely attack path

An unauthenticated attacker can reach the login.php endpoint over the network and inject via the Username parameter to trigger SQL injection. No user interaction is required, and no privileges are needed, given PR:N and UI:N. The impact is limited to the application scope but can expose or modify data within the voting system’s database.

Who is most exposed

Organizations hosting the Campcodes platform with public-facing login pages, typically on web stacks (PHP/LAMP or Windows/IIS), are most at risk—especially smaller deployments exposed to the internet without hardened access controls.

Detection ideas

  • WAF/IDS signatures alerting on SQLi payloads targeting login.php
  • Logs showing SQL error messages or database errors from login requests
  • Unusual login activity patterns (high frequency, from diverse IPs) targeting login
  • DB query logs with suspicious patterns during authentication attempts
  • Sudden spikes in 500/500+ errors tied to the login page

Mitigation and prioritisation

  • Patch or upgrade to fixed login logic; implement prepared statements and parameterised queries
  • Harden input handling and disable verbose DB error output; standardise error messages
  • Apply least-privilege DB accounts for the web app; restrict DB user capabilities
  • Deploy WAF rules and rate-limiting specific to the login endpoint; monitor for repeated abuse
  • Schedule staged remediation and validation with change-management; verify logs and access controls post-deployment

Note: KEV/EPSS data is not provided; treat as high-priority remediation given remote exploitation and public disclosure.


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.