CVE Alert: CVE-2025-10564 – Campcodes – Grocery Sales and Inventory System

CVE-2025-10564

HIGHNo exploitation known

A vulnerability was found in Campcodes Grocery Sales and Inventory System 1.0. Affected is an unknown function of the file /ajax.php?action=delete_category. Performing manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Grocery Sales and Inventory System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-16T20:32:07.007Z
Updated
2025-09-16T20:32:07.007Z

AI Summary Analysis

Risk verdict

High risk due to a publicly disclosed, unauthenticated remote SQL injection with PoC availability.

Why this matters

Exploitation could lead to data disclosure or modification within the vulnerable database and undermine inventory, orders, or customer data processes. The public exploit increases the likelihood of mass scans and automated attempts targeting this flaw.

Most likely attack path

Remote attacker sends a crafted ID in the vulnerable AJAX request without needing credentials or user interaction. With low attack complexity and network access, an attacker could potentially enumerate or exfiltrate data within the affected scope; the impact remains confined to the application DB unless compounded by weak DB privileges.

Who is most exposed

Web deployments of the affected application in typical SME environments (shared hosting or self-hosted LAMP stacks) are most at risk, especially where input is not parameterised and the delete_category action is accessible without strong auth.

Detection ideas

  • Unexpected or error-rich responses in web/app logs from delete_category requests with varied IDs
  • Repeated, unauthenticated requests to the endpoint showing SQL payload patterns
  • Anomalous DB query activity or long-running queries tied to the endpoint
  • WAF/IDS alerts for SQL injection signatures targeting id parameters
  • Elevated error rates after specific parameter values

Mitigation and prioritisation

  • Apply patch or upgrade to patched version; if unavailable, implement strict input handling and parameterised queries
  • Enforce least-privilege DB accounts and disable or tightly restrict the affected action
  • Implement input validation, prepared statements, and server-side sanitisation
  • Add web-app firewall rules and monitor for anomalous delete_category activity
  • Change-management: test in staging before production rollout; verify logs for post-deploy anomalies
  • Note: if KEV true or EPSS ≥ 0.5, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.