CVE-2025-6405

| EUVD-2025-18813 HIGH
2025-06-21 [email protected]
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 21:35 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 21:35 euvd
EUVD-2025-18813
PoC Detected
Jun 24, 2025 - 19:16 vuln.today
Public exploit code
CVE Published
Jun 21, 2025 - 14:15 nvd
HIGH 7.3

DescriptionNVD

A vulnerability classified as critical was found in Campcodes Online Teacher Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit-teacher-detail.php. The manipulation of the argument editid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AnalysisAI

CVE-2025-6405 is a critical SQL injection vulnerability in Campcodes Online Teacher Record Management System version 1.0, affecting the /admin/edit-teacher-detail.php endpoint through an unsanitized 'editid' parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of teacher records and sensitive educational data. Public disclosure and proof-of-concept availability indicate active exploitation risk, though CVSS 7.3 reflects moderate actual impact (read/write/availability) rather than complete system compromise.

Technical ContextAI

The vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), specifically SQL injection in the admin panel. The /admin/edit-teacher-detail.php file fails to properly sanitize or parameterize the 'editid' GET/POST parameter before incorporating it into SQL queries. Campcodes Online Teacher Record Management System 1.0 (CPE: cpe:2.3:a:campcodes:online_teacher_record_management_system:1.0:*:*:*:*:*:*:*) is a web-based educational administration platform typically built on PHP/MySQL or similar stack. The lack of prepared statements or input validation allows attackers to inject malicious SQL syntax (UNION-based, time-based blind, or error-based injection techniques) to bypass authentication and access backend databases.

RemediationAI

Immediate Patch: Upgrade to Campcodes Online Teacher Record Management System version 1.1 or later (if available). Check vendor website/repository for security updates.; priority: CRITICAL Code-Level Mitigation (if patch unavailable): Implement parameterized queries (prepared statements) in /admin/edit-teacher-detail.php. Replace direct string concatenation in SQL queries with bound parameters: use mysqli_prepare() or PDO prepared statements. Sanitize editid input with intval() or whitelist validation to ensure it matches expected teacher ID format.; priority: HIGH Input Validation: Enforce strict input validation: whitelist numeric values for editid (should be integer teacher ID). Reject or escape any non-numeric characters before database query.; priority: HIGH WAF/Network Mitigation: Deploy Web Application Firewall (WAF) rules to detect and block common SQL injection payloads in the editid parameter (pattern matching for UNION, SELECT, OR 1=1, etc.). This is temporary mitigation only.; priority: MEDIUM Access Control: Restrict admin panel access (/admin/*) via IP whitelist, VPN, or authentication gateway until patch is applied. Limit admin user accounts to essential personnel only.; priority: MEDIUM Monitoring: Enable SQL error logging and monitor for unusual query patterns in application/database logs. Alert on failed admin login attempts and anomalous /admin/edit-teacher-detail.php requests.; priority: MEDIUM

Share

CVE-2025-6405 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy