VYPR
High severity7.3NVD Advisory· Published Sep 1, 2025· Updated Apr 29, 2026

CVE-2025-9761

CVE-2025-9761

Description

A security vulnerability has been detected in Campcodes Online Feeds Product Inventory System 1.0. This vulnerability affects unknown code of the file /feeds/index.php of the component Login. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in Campcodes Online Feeds Product Inventory System 1.0 via username parameter allows remote attackers to execute arbitrary SQL queries.

Vulnerability

Details

The vulnerability is a SQL injection in the login mechanism of the Online Feeds Product Inventory System version 1.0, specifically in the file /feeds/index.php [2]. The root cause is improper sanitization of the 'username' parameter, which is directly concatenated into SQL queries without validation or escaping [2]. This allows an attacker to inject malicious SQL code through the username field during authentication.

Exploitation

Exploitation is performed remotely via HTTP POST requests to the /feeds/index.php endpoint [2]. No authentication or prior access is required. The provided payloads indicate a boolean-based blind SQL injection technique, likely using MySQL comments to bypass restrictions [2]. The vulnerability can be triggered with simple crafted input, making it accessible to attackers with minimal skill.

Impact

Successful exploitation enables an attacker to execute arbitrary SQL commands, leading to unauthorized access to the database [2]. This can result in data leakage, modification or deletion of sensitive information, and potentially full control of the underlying system [2]. The disclosure of the exploit code increases the risk of active attacks.

Mitigation

As of the publication date, no official patch has been released by the vendor [1]. The vendor's website appears to be a general source code repository, and no specific update for this product has been identified [1]. Users should consider disabling remote access to the vulnerable endpoint or implementing input validation and prepared statements as a workaround until a patch is available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • cpe:2.3:a:campcodes:online_feeds_product_inventory_system:1.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:campcodes:online_feeds_product_inventory_system:1.0:*:*:*:*:*:*:*
    • (no CPE)range: =1.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.