CVE-2025-13424
📋 TL;DR
Campcodes Supplier Management System 1.0 contains a SQL injection vulnerability in the /admin/add_product.php file via the txtProductName parameter. This allows attackers to execute arbitrary SQL commands on the database. Organizations using this specific version of the software are affected.
💻 Affected Systems
- Campcodes Supplier Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, and potential remote code execution if database permissions allow.
Likely Case
Unauthorized data access, modification, or deletion of supplier and product information in the database.
If Mitigated
Limited impact with proper input validation and database permission restrictions in place.
🎯 Exploit Status
Exploit requires admin access to reach /admin/add_product.php. SQL injection via txtProductName parameter is straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.campcodes.com/
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative software or implementing workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd parameterized queries or proper input sanitization to /admin/add_product.php
Modify PHP code to use prepared statements: $stmt = $conn->prepare('INSERT INTO products (name) VALUES (?)'); $stmt->bind_param('s', $txtProductName);
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns
Add WAF rule: SecRule ARGS:txtProductName "@detectSQLi" "id:1001,phase:2,deny,status:403"
🧯 If You Can't Patch
- Restrict access to /admin/add_product.php using IP whitelisting or strong authentication
- Implement database user with minimal permissions (read-only where possible)
🔍 How to Verify
Check if Vulnerable:
Test /admin/add_product.php with SQL injection payloads in txtProductName parameter
Check Version:
Check software version in admin panel or readme files
Verify Fix Applied:
Verify that SQL injection payloads no longer execute and return error messages
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts to admin panel
- Suspicious POST requests to /admin/add_product.php
Network Indicators:
- SQL keywords in POST parameters to vulnerable endpoint
- Unusual database connection patterns
SIEM Query:
source="web_logs" AND uri_path="/admin/add_product.php" AND (param="txtProductName" AND value MATCHES "(?i)(union|select|insert|delete|update|drop|--|#|/*)")