CVE Alert: CVE-2025-11555 – Campcodes – Online Learning Management System

CVE-2025-11555

HIGHNo exploitation known

A vulnerability was detected in Campcodes Online Learning Management System 1.0. This affects an unknown part of the file /admin/calendar_of_events.php. The manipulation of the argument date_start results in sql injection. The attack may be launched remotely. The exploit is now public and may be used.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Online Learning Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-09T20:32:05.595Z
Updated
2025-10-09T20:32:05.595Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection with public exploit code available, enabling data access and potential further abuse.

Why this matters

In an LMS context, an attacker can read or modify sensitive records and potentially disrupt availability. The vulnerability’s remote reach lowers barriers to exploitation, increasing risk for educational institutions and organisations hosting learning content or student data. If exploited, it could facilitate data exfiltration, integrity tampering, and wider information exposure.

Most likely attack path

No authentication or user interaction required, with low complexity and a network-based exploit vector. An attacker can craft input to the vulnerable parameter to trigger a database query that leaks or alters data, using existing database permissions. Given typical LMS DB permissions, impact may be confined to data in the application database but could still be substantial (confidentiality and integrity). Lateral movement is possible only if the attacker gains deeper DB privileges or accesses adjacent systems through the compromised account.

Who is most exposed

Institutions and organisations running the affected LMS version, especially those exposed to the internet or with poorly segmented admin interfaces. Self-hosted deployments and smaller providers are common exposure patterns for this product category.

Detection ideas

  • Alerts for unusual, error-prone SQL patterns in web logs.
  • Anomalous requests targeting admin endpoints or parameters like date_start.
  • WAF rules triggering on injection-like payloads.
  • Unusual data access or export patterns from the LMS database.
  • Post-incident DB query log review showing abnormal SELECT/UPDATE activity.

Mitigation and prioritisation

  • Apply available patch or upgrade to fixed version; implement hotfix if provided.
  • Enforce parameterised queries and input validation; review ORM/DB access controls.
  • Restrict admin interfaces to trusted networks; implement strong authentication and rate limiting.
  • Deploy WAF rules to block injection attempts; monitor for credential abuse.
  • Change management: treat as urgent fix window; verify backups and conduct post-patch testing.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.