CVE-2025-8229

A vulnerability classified as critical has been found in Campcodes Courier Management System 1.0. This affects an unknown part of the file /parcel_list.php. The manipulation of the argument s leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/XiaoJiesecqwq/CVE/issues/13 Broken Link Issue Tracking
https://vuldb.com/?ctiid.317817 Permissions Required VDB Entry
https://vuldb.com/?id.317817 Third Party Advisory VDB Entry
https://vuldb.com/?submit.622322 Third Party Advisory VDB Entry
https://vuldb.com/?submit.622322 Third Party Advisory VDB Entry
https://www.campcodes.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:campcodes:courier_management_system:1.0:*:*:*:*:*:*:*

History

07 Aug 2025, 14:15

Type Values Removed Values Added
CPE cpe:2.3:a:campcodes:courier_management_system:1.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Campcodes courier Management System
Campcodes
References () https://vuldb.com/?ctiid.317817 - () https://vuldb.com/?ctiid.317817 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.317817 - () https://vuldb.com/?id.317817 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.622322 - () https://vuldb.com/?submit.622322 - Third Party Advisory, VDB Entry
References () https://www.campcodes.com/ - () https://www.campcodes.com/ - Product
References () https://github.com/XiaoJiesecqwq/CVE/issues/13 - () https://github.com/XiaoJiesecqwq/CVE/issues/13 - Broken Link, Issue Tracking

28 Jul 2025, 15:15

Type Values Removed Values Added
CWE CWE-89
CWE-74
CVSS v2 : unknown
v3 : 6.3
v2 : unknown
v3 : unknown

27 Jul 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-27 10:15

Updated : 2025-08-07 14:15


NVD link : CVE-2025-8229

Mitre link : CVE-2025-8229


JSON object : View

Products Affected

campcodes

  • courier_management_system
CWE

No CWE.