CVE Alert: CVE-2025-9750 – Campcodes – Online Learning Management System
CVE-2025-9750
A security flaw has been discovered in Campcodes Online Learning Management System 1.0. This vulnerability affects unknown code of the file /admin/login.php. The manipulation of the argument Username results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
AI Summary Analysis
Risk verdict
High risk: public PoC/exploitable remote SQL injection on the login page warrants urgent remediation.
Why this matters
Successful exploitation could bypass authentication, allowing data exfiltration or modification and potentially disrupting LMS availability. In educational settings, this risks exposure of personal data, enrolment records, and academic information, with regulatory and reputational consequences.
Most likely attack path
Attacker reaches login.php over the network without authentication; crafts a payload in the Username parameter to trigger SQL injection, potentially reading or altering database content. With successful access, this can enable further compromise of the application server and adjacent data stores, though CVSS indicates broad confidentiality, integrity, and availability impacts are low per metric details.
Who is most exposed
Publicly reachable Campcodes LMS deployments (schools, universities, training organisations) running self-hosted or cloud-hosted instances with exposed login endpoints are most at risk, particularly where perimeter protections are weak or misconfigured.
Detection ideas
- Spikes in failed or unusual login attempts with SQLi-like payloads in Username
- Unexpected database errors or stack traces in application or DB logs
- Anomalous queries or permissions changes from the web server to the DB
- WAF/IPS blocks or alerts for typical SQL injection signatures
- SOC notifications for repeated login attempts from diverse IPs targeting login.php
Mitigation and prioritisation
- Apply vendor patch or upgrade to fixed version as priority; verify patch coverage across all environments
- Implement parameterised queries/prepared statements around login handling; sanitise input
- Enforce least privilege for DB accounts used by the LMS; restrict login.php DB access
- Deploy or tighten WAF rules to block common SQLi payloads; enable logging and alerting on login endpoints
- Schedule a rapid remediation window; coordinate with change management and communication to users; consider temporary access controls or MFA where feasible
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.