CVE Alert: CVE-2025-11415 – PHPGurukul – Beauty Parlour Management System

CVE-2025-11415

HIGHNo exploitation known

A vulnerability was identified in PHPGurukul Beauty Parlour Management System 1.1. Affected by this issue is some unknown functionality of the file /admin/customer-list.php. Such manipulation of the argument delid leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

CVSS v3.1 (7.3)
Vendor
PHPGurukul
Product
Beauty Parlour Management System
Versions
1.1
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-07T23:02:07.436Z
Updated
2025-10-07T23:02:07.436Z

AI Summary Analysis

Risk verdict

High. Remote SQL injection with a publicly available exploit means automated attempts are likely, even without authentication.

Why this matters

Attacker access could expose or corrupt customer data and undermine appointment/promo records, with potential regulatory and reputational consequences for small businesses using the system. The impact scales with the DB privileges granted to the application user.

Most likely attack path

An attacker can target the internet-facing /admin/customer-list.php endpoint, injecting into the delid parameter. The CVSS indicators show Network access, no user interaction, and no privileges required, with low-level data confidentiality/integrity/availability impact but full data exposure risk. The absence of UI interaction and public PoC increase the chance of rapid, automated exploitation, and successful access depends on the application’s database rights.

Who is most exposed

SMBs running PHPGurukul Beauty Parlour Management System 1.1 on common LAMP stacks, especially where the admin interface is internet-facing and DB access is not tightly restricted.

Detection ideas

  • Alert on anomalous delid values in admin/customer-list.php requests (SQL patterns, tautologies, or long inputs).
  • Web/app logs showing SQL errors or unusual query strings from the admin path.
  • IDS/IPS signatures for known SQLi payloads targeting MySQL/PostgreSQL depending on backend.
  • Sudden spikes in data retrieval or export activity from customer tables.
  • Unusual authentication/authorization events around the admin area.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a fixed release; implement parameterised queries or prepared statements for delid; treat input as integer.
  • Enforce least-privilege DB accounts for the application, and restrict network access to the DB server.
  • Implement WAF rules to block SQLi patterns targeting the admin page; enable logging/alerting for suspicious delid payloads.
  • Code and change-management: test the fix in staging, then roll out in a controlled window; monitor for persistent attempts.
  • If patching is delayed, disable or shield the admin endpoint and require VPN/MVA for access. Prioritisation: High.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.