CVE-2025-15214
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into the Campcodes Park Ticketing System 1.0 through the save_pricing function in admin_class.php. The cross-site scripting (XSS) attack can be performed remotely and may affect administrators or users who view manipulated content. The exploit is publicly available, increasing the risk of exploitation.
💻 Affected Systems
- Campcodes Park Ticketing System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, perform actions on behalf of authenticated users, deface the application, or redirect users to malicious sites.
Likely Case
Session hijacking leading to unauthorized administrative access, data theft, or website defacement.
If Mitigated
Limited impact if input validation and output encoding are properly implemented, though some functionality disruption may occur.
🎯 Exploit Status
Exploit details are publicly available on GitHub and vuldb.com, making it accessible to attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Consider implementing input validation and output encoding as a workaround, or replace the software with a secure alternative.
🔧 Temporary Workarounds
Implement Input Validation and Output Encoding
allAdd server-side validation to sanitize the 'name' and 'ride' parameters in admin_class.php, and encode output to prevent script execution.
Edit admin_class.php to add htmlspecialchars() or similar functions around user inputs in save_pricing function.
Restrict Admin Access
allLimit access to the admin interface to trusted IP addresses only.
Add IP whitelisting rules in .htaccess or web server configuration for the admin directory.
🧯 If You Can't Patch
- Deploy a web application firewall (WAF) with XSS protection rules.
- Monitor admin access logs for unusual activity and implement strong session management.
🔍 How to Verify
Check if Vulnerable:
Review the admin_class.php file for the save_pricing function and check if input sanitization is applied to 'name' and 'ride' parameters.
Check Version:
Check the software version in the system's admin panel or configuration files.
Verify Fix Applied:
Test the save_pricing functionality with script payloads to ensure they are properly encoded or blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to admin_class.php with script tags or JavaScript in parameters.
- Multiple failed login attempts followed by admin access.
Network Indicators:
- Traffic to admin endpoints containing malicious script patterns.
SIEM Query:
source="web_logs" AND uri="/admin_class.php" AND (param="name" OR param="ride") AND (value CONTAINS "<script>" OR value CONTAINS "javascript:")