CVE Alert: CVE-2025-9744 – Campcodes – Online Loan Management System

CVE-2025-9744

HIGHNo exploitation known

A weakness has been identified in Campcodes Online Loan Management System 1.0. The affected element is an unknown function of the file /ajax.php?action=login. Executing manipulation of the argument Username can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Online Loan Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-08-31T20:02:08.186Z
Updated
2025-08-31T20:02:08.186Z

AI Summary Analysis

Risk verdict

High risk due to remote SQL injection on the login endpoint, with a publicly available exploit.

Why this matters

Exploitation could disclose or modify loan data and personal information, with potential financial impact and service disruption.

Most likely attack path

Unauthenticated access is possible; attacker targets /ajax.php?action=login, injecting via Username. Remote and low effort; data exfiltration is likely confined to the DB, with further movement depending on DB permissions and app trust boundaries.

Who is most exposed

Web-facing deployments of Campcodes Online Loan Management System 1.0, especially within small to mid-size lenders, and unpatched or poorly configured instances.

Detection ideas

  • SQL error patterns in login logs
  • Suspicious Username payloads (quotes, 1=1)
  • Spike in login failures or unusual DB queries
  • IDS/IPS alerts for SQLi on the login URL
  • Anomalous data export events following login attempts

Mitigation and prioritisation

  • Patch to fixed version or apply vendor fix
  • Use parameterised queries and strict input validation
  • WAF/IPS rules for login SQLi; monitor for SQLi signals
  • Least-privilege DB accounts and rotate credentials
  • Change-management: test in staging, then rapid deployment; escalate to priority 1 if KEV true or EPSS ≥0.5

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.