CVE Alert: CVE-2025-11062 – Campcodes – Online Learning Management System

CVE-2025-11062

HIGHNo exploitation known

A vulnerability was determined in Campcodes Online Learning Management System 1.0. This vulnerability affects unknown code of the file /admin/save_student.php. Executing manipulation of the argument class_id can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Online Learning Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-27T13:02:06.078Z
Updated
2025-09-27T13:02:06.078Z

AI Summary Analysis

Risk verdict

High risk of exploitation for internet-facing deployments; public disclosure and a PoC exist, so act with urgency when exposed.

Why this matters

Unauthenticated, remote SQL injection could expose or modify student data, grades, or authentication material, undermining data integrity and confidentiality. The attacker’s goals include data theft, tampering, or leverage for broader access within the affected environment; widespread impact motivates rapid containment, auditing, and credential protection.

Most likely attack path

Remote attacker can target an injectable parameter without requiring user interaction, taking advantage of unauthenticated access (low attack complexity). The vulnerability permits database-level impact within the same scope as the application, enabling data exfiltration or modification; lateral movement would depend on the compromised app DB account. Precondition: publicly reachable web app with a vulnerable query; no privileges required at the authentication layer.

Who is most exposed

Any organisation running a publicly accessible LMS or student information portal is at risk, especially those hosted on shared or cloud platforms with internet exposure and limited input validation.

Detection ideas

  • Alerts on unexpected SQL syntax or error messages in application logs.
  • Anomalous or oversized class_id-like parameters in requests to the vulnerable endpoint.
  • spikes in 500-series responses or DB error logs following web requests.
  • Repeated, suspicious payloads indicative of SQL injection testing.
  • WAF or IDS signatures triggering on typical injection patterns.

Mitigation and prioritisation

  • Apply available vendor patch or upgrade to a fixed release; if unavailable, implement compensating controls immediately.
  • Enforce input validation and parameterized queries; disable or tightly constrain dynamic SQL.
  • Restrict DB privileges for the application account to least privilege; separate accounts for read/write where feasible.
  • Enable robust logging and real-time monitoring; implement web application firewall rules targeting injection signatures.
  • Plan a change-management window for patching; verify backups and test in staging prior to production. If KEV true or EPSS ≥ 0.5, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.