A vulnerability was found in Campcodes Sales and Inventory System 1.0 and classified as critical. This issue affects some unknown processing of the file /pages/customer_update.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
History

Fri, 16 May 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Campcodes
Campcodes sales And Inventory System
CPEs cpe:2.3:a:campcodes:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Vendors & Products Campcodes
Campcodes sales And Inventory System

Mon, 12 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 10 May 2025 14:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Campcodes Sales and Inventory System 1.0 and classified as critical. This issue affects some unknown processing of the file /pages/customer_update.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Campcodes Sales and Inventory System customer_update.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-05-12T14:27:48.198Z

Reserved: 2025-05-09T12:48:51.151Z

Link: CVE-2025-4503

cve-icon Vulnrichment

Updated: 2025-05-12T14:27:37.276Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-10T14:15:32.997

Modified: 2025-05-16T13:58:11.200

Link: CVE-2025-4503

cve-icon Redhat

No data.