VYPR
High severity7.3NVD Advisory· Published Sep 23, 2025· Updated Apr 29, 2026

CVE-2025-10857

CVE-2025-10857

Description

A security flaw has been discovered in Campcodes Point of Sale System POS 1.0. Affected by this issue is some unknown functionality of the file /login.php. Performing manipulation of the argument Username results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A publicly-disclosed SQL injection in Campcodes Point of Sale System 1.0 allows remote attackers to manipulate the Username parameter in /login.php.

Vulnerability

Overview

An SQL injection vulnerability exists in Campcodes Point of Sale System POS 1.0. The flaw affects the /login.php endpoint, where manipulation of the Username argument allows an attacker to inject arbitrary SQL commands into the application's database query. This is a classic unauthenticated SQL injection that requires no special privileges beyond network access to the login page. [1]

Exploitation

Details

The attack vector is remote and does not require authentication. An attacker can craft a malicious Username parameter containing SQL-specific payloads (e.g., using single quotes or boolean-based conditions) as part of an HTTP request to /login.php. The absence of input sanitization or prepared statements means the injected SQL commands are executed directly by the database backend. Public exploit code has already been released, increasing the immediacy of the threat. [1]

Impact and

Risk

A successful SQL injection can enable an attacker to bypass authentication entirely, gain unauthorized administrative access to the POS system, and extract, modify, or delete sensitive data such as customer records, inventory details, and transaction logs. Given that this is a point-of-sale application, data exfiltration could include financial information, resulting in serious confidentiality and integrity breaches. [1]

Mitigation

Status

As of publication, no official patch has been announced by Campcodes for version 1.0. The vendor's website indicates that this project may be a free or open-source system, but no security update or advisory has been released. Users are strongly advised to immediately implement input validation and parameterized queries on the login form, restrict network access to the administrative interface where possible, and monitor logs for suspicious login attempts until a vendor fix is available. [1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • cpe:2.3:a:campcodes:point_of_sale_system:1.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:campcodes:point_of_sale_system:1.0:*:*:*:*:*:*:*
    • (no CPE)range: =1.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.