CVE Alert: CVE-2025-9694 – Campcodes – Advanced Online Voting System

CVE-2025-9694

HIGHNo exploitation known

A vulnerability was determined in Campcodes Advanced Online Voting System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/login.php. Executing manipulation of the argument Username can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Advanced Online Voting System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-08-30T15:02:07.687Z
Updated
2025-08-30T15:02:07.687Z

AI Summary Analysis

Risk verdict

Urgent: public exploitation of a remote, unauthenticated SQL injection on the login page could expose or alter sensitive data and enable automated abuse.

Why this matters

The flaw targets the authentication surface of an online voting system, risking credential exposure, vote tampering, or discovery of admin data. With a public PoC and remote access, attackers may rapidly probe and compromise multiple instances, eroding trust and election integrity.

Most likely attack path

An attacker sends crafted input to the login Username field over the network, exploiting SQL injection without authentication or user interaction. The vulnerability’s CVSS signals remote access and limited preconditions; successful exploitation can read or modify the database and potentially enable further access within the app’s scope.

Who is most exposed

Any deployment hosting Campcodes Advanced Online Voting System v1.0 with the admin/login.php endpoint exposed to unauthenticated or broad network access is at risk. Common patterns include web-facing installations on standard stacks (LAMP/MEAN) with public internet exposure or insufficient input sanitisation.

Detection ideas

  • Unusual or failed SQL errors in web/application logs from /admin/login.php
  • SQLi-like payloads in Username parameters (tautologies, comments, UNION payloads)
  • Anomalous login sequences or successful logins after failed attempts
  • Elevated DB query times or locks following login requests
  • WAF/IDS alerts for SQL injection signatures targeting login endpoints

Mitigation and prioritisation

  • Apply patched version or hotfix; implement parameterised queries/prepared statements; sanitise inputs
  • Enforce least-privilege DB accounts and rotate credentials; restrict DB user from dangerous operations
  • Add or tune WAF rules to block SQLi patterns; monitor/alert on /admin/login.php activity
  • Segment admin interfaces and require MFA; disable unnecessary dynamic SQL
  • Plan and test changes in staging; establish a rapid patch window; if patching is delayed, deploy compensating controls and tighten access logs.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.