CVE Alert: CVE-2025-10079 – PHPGurukul – Small CRM

CVE-2025-10079

HIGHNo exploitation known

A flaw has been found in PHPGurukul Small CRM 4.0. Affected by this vulnerability is an unknown functionality of the file /get-quote.php. Executing manipulation of the argument Contact can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.

CVSS v3.1 (7.3)
Vendor
PHPGurukul
Product
Small CRM
Versions
4.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-08T02:32:07.484Z
Updated
2025-09-08T02:32:07.484Z

AI Summary Analysis

Risk verdict

High risk: unauthenticated remote SQL injection with a publicly disclosed exploit; patching should be treated as urgent.

Why this matters

Direct access to get-quote.php allows manipulation of the Contact parameter to exfiltrate or alter database content. The vulnerability affects a CRM component, meaning customer data exposure or tampering could impact trust, compliance, and revenue. The presence of a publicly available exploit raises the likelihood of automated attacks against exposed deployments.

Most likely attack path

An external attacker can reach get-quote.php over the network, supply crafted Contact input, and trigger SQL injection without authentication. The CVSS signals remote access, low user interaction, and no privileges required, with modest but persistent impact on confidentiality, integrity, and availability. If successful, attackers may read or modify data and potentially leverage compromised credentials or connections for further access within the application stack.

Who is most exposed

Any organisation running PHPGurukul Small CRM 4.0 on publicly reachable hosts, especially in shared hosting or poorly segmented environments, is at risk. Unpatched test, staging, or dev instances exposed to the internet also present vulnerable entry points.

Detection ideas

  • Logs show suspicious Contact values in GET parameters to /get-quote.php (e.g., classic SQLi patterns).
  • Database error messages or syntax errors logged around /get-quote.php requests.
  • Unusual spikes in query latency or abnormal data returned from the CRM DB.
  • WAF/IDS alerts for SQLi payloads targeting PHP CGI endpoints.
  • Increased failed or unexpected authentication/authorization events tied to the CRM endpoint.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to latest Small CRM version; validate patch in staging first.
  • If patch isn’t available, implement input validation and parameterised queries (prepared statements) for all DB calls; remove dynamic SQL construction.
  • Deploy WAF rules targeting SQLi patterns and restrict access to get-quote.php to trusted networks.
  • Review and harden DB credentials, rotate where appropriate, and segregate CRM DB from other services.
  • Change-management: test regression impact, monitor logs for repeat attempts post-deployment.
  • Note: KEV/EPSS data is not provided; due to public exploit, escalate to high priority while awaiting additional exploitation likelihood indicators.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.