CVE Alert: CVE-2025-9726 – Campcodes – Farm Management System

CVE-2025-9726

HIGHNo exploitation known

A security flaw has been discovered in Campcodes Farm Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /review.php. The manipulation of the argument pid results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be exploited.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Farm Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-08-31T11:02:06.916Z
Updated
2025-08-31T11:02:06.916Z

AI Summary Analysis

Risk verdict

High risk: remote SQL injection with a publicly available exploit, requiring urgent patching and active monitoring.

Why this matters

An unauthenticated attacker can manipulate a user-supplied parameter to extract or alter database content, potentially exposing sensitive farm data, compromising records, and enabling further system abuse. In operational terms, this can disrupt farm operations, erode trust, and invite regulatory or liability exposure if personal data is involved.

Most likely attack path

Attackers would probe the public web entry point, abuse the pid parameter in the vulnerable function, and trigger a database query that bypasses application logic. With no user interaction required and no privileges needed, the adversary could read or modify data, with lateral impact contingent on the DB account’s permissions and scope.

Who is most exposed

Publicly accessible, web-facing deployments of the system (especially on-prem or SMB-hosted instances) without strict input validation or DB access controls are most at risk; installations with shared hosting or weakly isolated database users are particularly vulnerable.

Detection ideas

  • SQL error messages or stack traces in web/app logs referencing pid
  • Anomalous PID values or unexpected query patterns in /review.php access logs
  • spikes in database query duration or connections from internet-facing IPs
  • Unusual data reads/writes for farm records from the web tier
  • IDS/WAF alerts on suspicious SQL patterns targeting the endpoint

Mitigation and prioritisation

  • Apply official patch or upgrade to a version that fixes the injection vulnerability; verify integrity after update.
  • Implement parameterised queries and strict input validation around pid; enforce least-privilege DB accounts.
  • Introduce or tighten a WAF rule-set to block common SQLi payloads targeting review.php.
  • Restrict remote access to the affected endpoint; consider IP allow-lists and MFA for management interfaces.
  • Enhance monitoring and enable alerting for anomalous queries, data exfiltration signs, and rapid privilege escalation attempts. If KEV is confirmed or EPSS ≥ 0.5, treat as priority 1. Data gaps remain for SSVC exploitation state and EPSS; confirm these to adjust prioritisation.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.