CVE-2025-7538

| EUVD-2025-21266 HIGH
2025-07-13 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:18 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:18 euvd
EUVD-2025-21266
PoC Detected
Jul 16, 2025 - 14:54 vuln.today
Public exploit code
CVE Published
Jul 13, 2025 - 19:15 nvd
HIGH 7.3

Description

A vulnerability classified as critical was found in Campcodes Sales and Inventory System 1.0. This vulnerability affects unknown code of the file /pages/product_update.php. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-7538 is a critical unrestricted file upload vulnerability in Campcodes Sales and Inventory System version 1.0, specifically in the /pages/product_update.php file's image parameter handling. An unauthenticated remote attacker can upload arbitrary files without restriction, potentially leading to remote code execution, data compromise, and system availability impact. The vulnerability has been publicly disclosed with exploit code available, making active exploitation a significant concern.

Technical Context

The vulnerability exists in a PHP-based web application (Campcodes Sales and Inventory System) that implements product management functionality. The /pages/product_update.php endpoint accepts file uploads via the 'image' parameter without proper validation, filtering, or access controls. This falls under CWE-284 (Improper Access Control) combined with CWE-434 (Unrestricted Upload of File with Dangerous Type). The root cause is insufficient input validation and file type verification on the server-side, allowing attackers to bypass intended security controls. PHP applications commonly suffer from this class of vulnerability when uploaded files are not sanitized for MIME type, extension, or content before being stored in web-accessible directories.

Affected Products

Campcodes Sales and Inventory System version 1.0 is explicitly vulnerable. The specific affected endpoint is /pages/product_update.php. No patch version information is provided in the available data. CPE for the affected product would be: cpe:2.3:a:campcodes:sales_and_inventory_system:1.0:*:*:*:*:*:*:* (CPE string constructed from vendor/product/version nomenclature, though official CPE assignment by NIST may differ). Vendor name 'Campcodes' and product 'Sales and Inventory System' are confirmed affected. No information on newer versions or patch availability is currently available from the provided intelligence sources.

Remediation

Immediate actions: (1) Disable or restrict access to /pages/product_update.php pending patch availability; (2) Implement strict file upload validation on the server-side: verify MIME type (Content-Type header), validate file extensions against a whitelist (e.g., .jpg, .png only), and check file content magic bytes; (3) Store uploaded files outside the web root directory to prevent direct execution; (4) Implement proper access controls requiring authentication and authorization checks before allowing uploads. Patch remediation: Contact Campcodes directly for security patches addressing CVE-2025-7538, as no official patch version is referenced in current intelligence. Temporary mitigation: Apply Web Application Firewall (WAF) rules to block requests to /pages/product_update.php or enforce strict Content-Type validation on the image parameter. Implement file upload rate limiting and monitor for suspicious upload patterns.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-7538 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy