CVE-2025-14582

4.7 MEDIUM

📋 TL;DR

This vulnerability in campcodes Online Student Enrollment System 1.0 allows attackers to upload arbitrary files via the userphoto parameter in the admin interface. This affects all systems running the vulnerable version of this software. Remote attackers can potentially upload malicious files to compromise the system.

💻 Affected Systems

Products:
  • campcodes Online Student Enrollment System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the admin interface at /admin/index.php?page=user-profile

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through webshell upload leading to remote code execution, data theft, or server takeover.

🟠

Likely Case

Unauthorized file upload leading to defacement, data manipulation, or limited server access.

🟢

If Mitigated

File upload blocked or restricted to safe types only, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin access to reach the vulnerable endpoint

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.campcodes.com/

Restart Required: No

Instructions:

No official patch available. Consider implementing workarounds or replacing the software.

🔧 Temporary Workarounds

File Upload Restriction

all

Implement server-side validation to restrict uploaded file types to safe extensions only

Web Application Firewall Rule

all

Block requests containing suspicious file upload patterns to /admin/index.php

🧯 If You Can't Patch

  • Restrict access to /admin/ directory to trusted IP addresses only
  • Implement file integrity monitoring on upload directories

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a file with a malicious extension (e.g., .php, .jsp) via the userphoto parameter at /admin/index.php?page=user-profile

Check Version:

Check the software version in the admin panel or application files

Verify Fix Applied:

Verify that only allowed file types can be uploaded and malicious extensions are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /admin/index.php
  • Uploads of non-image file types via userphoto parameter

Network Indicators:

  • POST requests to /admin/index.php?page=user-profile with file uploads

SIEM Query:

source="web_logs" AND uri="/admin/index.php" AND method="POST" AND params CONTAINS "userphoto"

🔗 References

📤 Share & Export