CVE-2025-13555

7.3 HIGH

📋 TL;DR

Campcodes School File Management System 1.0 contains a SQL injection vulnerability in the login component's stud_no parameter. Attackers can remotely execute arbitrary SQL commands, potentially compromising the entire database. All users of version 1.0 are affected.

💻 Affected Systems

Products:
  • Campcodes School File Management System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /index.php login component specifically. Any deployment with default configuration is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, authentication bypass, remote code execution, and full system takeover.

🟠

Likely Case

Unauthorized data access, credential theft, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit available via GitHub reference. Attack requires no authentication and is trivial to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.campcodes.com/

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the stud_no parameter

Input Validation Filter

all

Implement server-side validation to reject non-alphanumeric characters in stud_no parameter

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict access controls
  • Implement database-level protections like stored procedures with parameterized inputs

🔍 How to Verify

Check if Vulnerable:

Test the login page with SQL injection payloads in the stud_no parameter (e.g., ' OR '1'='1)

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and return proper error handling

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in login requests
  • Multiple failed login attempts with SQL characters
  • Database error messages in application logs

Network Indicators:

  • HTTP POST requests to /index.php containing SQL keywords in stud_no parameter
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND uri="/index.php" AND (stud_no CONTAINS "' OR" OR stud_no CONTAINS "UNION" OR stud_no CONTAINS "SELECT")

🔗 References

📤 Share & Export