CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /pages/reprint_cash.php. The manipulation of the argument sid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-7535 is a critical SQL injection vulnerability in Campcodes Sales and Inventory System version 1.0, located in the /pages/reprint_cash.php file's 'sid' parameter. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploits available, making it an immediate threat to deployed instances.
Technical Context
The vulnerability is rooted in CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, also known as 'Injection'), specifically SQL injection. The vulnerable code in /pages/reprint_cash.php fails to properly sanitize or parameterize the 'sid' (likely Session ID or Sales ID) parameter before using it in SQL queries. Campcodes Sales and Inventory System is a PHP-based web application (implied by .php file extension) that manages sales transactions and inventory. The lack of input validation allows attackers to inject malicious SQL syntax directly into database queries. The affected CPE would be: cpe:2.3:a:campcodes:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Affected Products
[{'vendor': 'Campcodes', 'product': 'Sales and Inventory System', 'affected_versions': ['1.0'], 'cpe': 'cpe:2.3:a:campcodes:sales_and_inventory_system:1.0:*:*:*:*:*:*:*', 'vulnerable_component': '/pages/reprint_cash.php', 'vulnerable_parameter': 'sid', 'deployment_type': 'Web Application (PHP)'}]
Remediation
[{'type': 'patch', 'recommendation': 'Upgrade Campcodes Sales and Inventory System beyond version 1.0. Check vendor website (campcodes.com or official repository) for patched version release. Version 1.0 is legacy; patches may be available as 1.1 or 2.0.', 'priority': 'CRITICAL'}, {'type': 'immediate_workaround', 'steps': ['Disable or restrict access to /pages/reprint_cash.php at the web server level (firewall rule, Apache/Nginx configuration) until patch is applied', "Implement Web Application Firewall (WAF) rules to block SQL injection patterns in the 'sid' parameter (e.g., detecting single quotes, UNION, SELECT keywords)", "Implement input validation: whitelist alphanumeric characters only for 'sid' parameter; reject any special characters"]}, {'type': 'defensive_coding_fix', 'steps': ['Replace direct SQL concatenation with parameterized queries (prepared statements) using mysqli or PDO with bound parameters', "Example: Use `$stmt = $mysqli->prepare('SELECT * FROM sales WHERE sid = ?'); $stmt->bind_param('s', $sid);` instead of string interpolation", 'Implement output encoding/escaping for any reflected data']}, {'type': 'detection_and_monitoring', 'steps': ['Enable SQL error logging to detect injection attempts', 'Monitor /pages/reprint_cash.php access logs for suspicious patterns (URL encoding anomalies, SQL keywords)', 'Implement database activity monitoring (DAM) to detect unusual query patterns']}]
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21264