CVE-2026-5546
Unrestricted File Upload in Campcodes LMS add_lesson Function
Publication date: 2026-04-05
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| campcodes | complete_online_learning_management_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in the Campcodes Complete Online Learning Management System version 1.0, specifically in the add_lesson function within the /application/models/Crud_model.php file.
The flaw allows an attacker to perform an unrestricted upload, meaning they can upload files without proper restrictions or validation.
The attack can be initiated remotely, and an exploit for this vulnerability has already been published.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to upload arbitrary files to the system without restriction.
Such unrestricted upload can lead to potential compromise of the system, including the possibility of executing malicious code, defacing the website, or gaining unauthorized access.
Because the attack can be performed remotely, it increases the risk of exploitation without physical access to the system.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps are not detailed in the provided information.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how the vulnerability in Campcodes Complete Online Learning Management System 1.0 impacts compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability involves unrestricted file upload via the add_lesson function in the /application/models/Crud_model.php file of Campcodes Complete Online Learning Management System 1.0. Detection would involve monitoring for unusual file upload activity or attempts to exploit this function remotely.
Specific commands or detection methods are not provided in the available resources.