CVE-2025-7535

| EUVD-2025-21264 HIGH
2025-07-13 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21264
PoC Detected
Jul 16, 2025 - 14:55 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 18:15 nvd
HIGH 7.3

Description

A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /pages/reprint_cash.php. The manipulation of the argument sid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7535 is a critical SQL injection vulnerability in Campcodes Sales and Inventory System version 1.0, located in the /pages/reprint_cash.php file's 'sid' parameter. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploits available, making it an immediate threat to deployed instances.

Technical Context

The vulnerability is rooted in CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, also known as 'Injection'), specifically SQL injection. The vulnerable code in /pages/reprint_cash.php fails to properly sanitize or parameterize the 'sid' (likely Session ID or Sales ID) parameter before using it in SQL queries. Campcodes Sales and Inventory System is a PHP-based web application (implied by .php file extension) that manages sales transactions and inventory. The lack of input validation allows attackers to inject malicious SQL syntax directly into database queries. The affected CPE would be: cpe:2.3:a:campcodes:sales_and_inventory_system:1.0:*:*:*:*:*:*:*

Affected Products

[{'vendor': 'Campcodes', 'product': 'Sales and Inventory System', 'affected_versions': ['1.0'], 'cpe': 'cpe:2.3:a:campcodes:sales_and_inventory_system:1.0:*:*:*:*:*:*:*', 'vulnerable_component': '/pages/reprint_cash.php', 'vulnerable_parameter': 'sid', 'deployment_type': 'Web Application (PHP)'}]

Remediation

[{'type': 'patch', 'recommendation': 'Upgrade Campcodes Sales and Inventory System beyond version 1.0. Check vendor website (campcodes.com or official repository) for patched version release. Version 1.0 is legacy; patches may be available as 1.1 or 2.0.', 'priority': 'CRITICAL'}, {'type': 'immediate_workaround', 'steps': ['Disable or restrict access to /pages/reprint_cash.php at the web server level (firewall rule, Apache/Nginx configuration) until patch is applied', "Implement Web Application Firewall (WAF) rules to block SQL injection patterns in the 'sid' parameter (e.g., detecting single quotes, UNION, SELECT keywords)", "Implement input validation: whitelist alphanumeric characters only for 'sid' parameter; reject any special characters"]}, {'type': 'defensive_coding_fix', 'steps': ['Replace direct SQL concatenation with parameterized queries (prepared statements) using mysqli or PDO with bound parameters', "Example: Use `$stmt = $mysqli->prepare('SELECT * FROM sales WHERE sid = ?'); $stmt->bind_param('s', $sid);` instead of string interpolation", 'Implement output encoding/escaping for any reflected data']}, {'type': 'detection_and_monitoring', 'steps': ['Enable SQL error logging to detect injection attempts', 'Monitor /pages/reprint_cash.php access logs for suspicious patterns (URL encoding anomalies, SQL keywords)', 'Implement database activity monitoring (DAM) to detect unusual query patterns']}]

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-7535 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy