VYPR
High severity7.3NVD Advisory· Published Sep 15, 2025· Updated Apr 29, 2026

CVE-2025-10426

CVE-2025-10426

Description

A security flaw has been discovered in itsourcecode Online Laundry Management System 1.0. This affects an unknown function of the file /login.php. Performing manipulation of the argument Username results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Online Laundry Management System 1.0 /login.php has a SQL injection flaw in the username parameter, enabling remote, unauthenticated database attacks with public exploit code.

SQL

Injection in Login Page

The Online Laundry Management System 1.0, developed by itsourcecode, contains a SQL injection vulnerability in the /login.php file. The root cause is insufficient validation of the username POST parameter, which is directly concatenated into SQL queries without sanitization [1]. This allows an attacker to inject arbitrary SQL statements through the username input field.

Attack

Vector

This vulnerability is remotely exploitable and requires no authentication [1]. An attacker can submit a crafted POST request to /login.php containing malicious SQL payloads in the username field. Public proof-of-concept (POC) exploit code has been released, demonstrating the ability to perform boolean-based blind SQL injection [1]. The attack surface is exposed to any network reachable to the application.

Impact

Successful exploitation grants the attacker unauthorized access to the underlying database. This can lead to sensitive data leakage, data modification or deletion, and potentially full system compromise [1]. The impact is severe for business continuity and data integrity, as the application's database can be fully controlled by the attacker.

Mitigation

As of this publication, no official patch or fixed version has been released. The vendor's website (https://campcodes.com) hosts the source code, but no advisory or update is yet available [2]. System administrators should immediately apply input validation and parameterized queries to the login functionality, restrict network access to the application, and monitor for any signs of exploitation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*
    • (no CPE)range: = 1.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.