A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /pages/purchase_add.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
History

Wed, 28 May 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Campcodes
Campcodes sales And Inventory System
CPEs cpe:2.3:a:campcodes:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Vendors & Products Campcodes
Campcodes sales And Inventory System

Fri, 16 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 May 2025 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /pages/purchase_add.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Title Campcodes Sales and Inventory System purchase_add.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-05-16T15:43:38.088Z

Reserved: 2025-05-15T08:00:38.733Z

Link: CVE-2025-4741

cve-icon Vulnrichment

Updated: 2025-05-16T15:43:33.952Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-16T04:15:45.090

Modified: 2025-05-28T14:27:04.720

Link: CVE-2025-4741

cve-icon Redhat

No data.