{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9492","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-26T16:29:57.000Z","datePublished":"2025-08-26T22:02:07.508Z","dateUpdated":"2025-08-27T16:14:00.394Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-26T22:02:07.508Z"},"title":"Campcodes Online Water Billing System addclient1.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Campcodes","product":"Online Water Billing System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in Campcodes Online Water Billing System 1.0. This affects an unknown function of the file /addclient1.php. Executing manipulation of the argument lname can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. Other parameters might be affected as well."},{"lang":"de","value":"Es wurde eine Schwachstelle in Campcodes Online Water Billing System 1.0 entdeckt. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei /addclient1.php. Mittels dem Manipulieren des Arguments lname mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-26T18:35:00.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"l0ners (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.321473","name":"VDB-321473 | Campcodes Online Water Billing System addclient1.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.321473","name":"VDB-321473 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.635352","name":"Submit #635352 | Campcodes Online Water Billing System V1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/skyrainoh/CVE/issues/9","tags":["exploit","issue-tracking"]},{"url":"https://www.campcodes.com/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-27T16:13:40.357970Z","id":"CVE-2025-9492","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-27T16:14:00.394Z"}}]}}