CVE Alert: CVE-2025-11061 – Campcodes – Online Learning Management System

CVE-2025-11061

HIGHNo exploitation known

A vulnerability was found in Campcodes Online Learning Management System 1.0. This affects an unknown part of the file /admin/edit_student.php. Performing manipulation of the argument cys results in sql injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Online Learning Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-27T12:32:06.192Z
Updated
2025-09-27T12:32:06.192Z

AI Summary Analysis

Risk verdict

High risk due to a publicly disclosed, remote SQL injection on a web-facing admin function; treat as priority 1.

Why this matters

Compromise could lead to reading or modifying sensitive student data, potential data exfiltration, or integrity/availability impact on LMS records. The public PoC and exploit links imply automated tooling could target multiple deployments quickly, heightening the chance of broad impact across institutions.

Most likely attack path

An attacker can reach the vulnerable endpoint over the internet, with no authentication or user interaction required. The injection hinges on an unsafe cys parameter in edit_student.php, allowing data access or modification via the database; if successful, the attacker could linger in the web app or escalate access within the database, depending on DB permissions and app logic.

Who is most exposed

Any Campcodes LMS 1.0 deployment that exposes the admin interface publicly (on-premises or cloud-hosted) is at risk, especially multi-tenant or educational institutions with web-facing administration.

Detection ideas

  • Monitor for unexpected SQL error messages or anomalous query patterns in /admin/edit_student.php requests.
  • Alert on unusual payloads targeting the cys parameter (e.g., UNION SELECT, COMMENT markers, tautologically crafted inputs).
  • WAF/signatures triggering on SQLi patterns; spikes in access to the admin endpoint.
  • DB query logs showing suspect SELECT/INSERT/UPDATE commands from unauthorised sources.
  • SIEM alerts for rapid, repeated attempts from multiple IPs targeting the endpoint.

Mitigation and prioritisation

  • Patch to fixed Campcodes version as soon as available; if not, apply vendor-recommended mitigations and disable risky parameter handling.
  • Implement parameterised queries, input validation, and least-privilege DB accounts; restrict admin endpoint access (IP allowlists, MFA where feasible).
  • Deploy or tune WAF rules to block known SQLi patterns; enable strict output/error handling to deter error-based leakage.
  • Change-management: treat as priority 1; escalate to incident response if exploitation attempts are observed.
  • Verify backups and test rollback plans; prepare for rapid containment if exploitation is detected.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.