CVE-2026-5546
Received Received - Intake
Unrestricted File Upload in Campcodes LMS add_lesson Function

Publication date: 2026-04-05

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in Campcodes Complete Online Learning Management System 1.0. This impacts the function add_lesson of the file /application/models/Crud_model.php. This manipulation causes unrestricted upload. It is possible to initiate the attack remotely. The exploit has been published and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
campcodes complete_online_learning_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a flaw in the Campcodes Complete Online Learning Management System version 1.0, specifically in the add_lesson function within the /application/models/Crud_model.php file.

The flaw allows an attacker to perform an unrestricted upload, meaning they can upload files without proper restrictions or validation.

The attack can be initiated remotely, and an exploit for this vulnerability has already been published.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to upload arbitrary files to the system without restriction.

Such unrestricted upload can lead to potential compromise of the system, including the possibility of executing malicious code, defacing the website, or gaining unauthorized access.

Because the attack can be performed remotely, it increases the risk of exploitation without physical access to the system.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps are not detailed in the provided information.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the vulnerability in Campcodes Complete Online Learning Management System 1.0 impacts compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability involves unrestricted file upload via the add_lesson function in the /application/models/Crud_model.php file of Campcodes Complete Online Learning Management System 1.0. Detection would involve monitoring for unusual file upload activity or attempts to exploit this function remotely.

Specific commands or detection methods are not provided in the available resources.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart