CVE-2025-10831

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary SQL commands via the 'prodcode' parameter in the /pages/pro_edit1.php file in Campcodes Computer Sales and Inventory System 1.0. This affects all users running this specific version of the software. SQL injection can lead to data theft, data manipulation, or complete system compromise.

💻 Affected Systems

Products:
  • Campcodes Computer Sales and Inventory System
Versions: 1.0
Operating Systems: Any OS running PHP with database backend
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific file /pages/pro_edit1.php when accessible via web server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data exfiltration, data destruction, or remote code execution if database permissions allow.

🟠

Likely Case

Unauthorized access to sensitive inventory and sales data, potential privilege escalation within the application.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and public exploit details exist.
🏢 Internal Only: MEDIUM - Still significant risk if internal attackers exist, but reduced exposure compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily exploitable by attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.campcodes.com/

Restart Required: No

Instructions:

No official patch available. Contact vendor for updated version or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation for the prodcode parameter to only accept expected values.

Modify /pages/pro_edit1.php to validate prodcode parameter using PHP filter functions or regex patterns

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.

Configure WAF to block requests containing SQL keywords targeting /pages/pro_edit1.php

🧯 If You Can't Patch

  • Restrict access to /pages/pro_edit1.php using network ACLs or authentication
  • Monitor logs for SQL injection attempts and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Test the /pages/pro_edit1.php endpoint with SQL injection payloads in the prodcode parameter and observe database errors or unexpected behavior.

Check Version:

Check application version in admin panel or review source code for version markers

Verify Fix Applied:

After implementing fixes, test with the same SQL injection payloads and verify they are rejected or properly handled without database errors.

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in web server logs
  • Unusual database queries from web application
  • Multiple failed requests to /pages/pro_edit1.php with SQL keywords

Network Indicators:

  • HTTP requests to /pages/pro_edit1.php containing SQL injection patterns
  • Unusual database traffic from web server

SIEM Query:

source="web_server" AND (url="/pages/pro_edit1.php" AND (request CONTAINS "UNION" OR request CONTAINS "SELECT" OR request CONTAINS "INSERT" OR request CONTAINS "DELETE"))

🔗 References

📤 Share & Export