CVE Alert: CVE-2025-10114 – PHPGurukul – Small CRM

CVE-2025-10114

HIGHNo exploitation known

A vulnerability was found in PHPGurukul Small CRM 4.0. Affected by this issue is some unknown functionality of the file /profile.php. The manipulation of the argument Name results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.

CVSS v3.1 (7.3)
Vendor
PHPGurukul
Product
Small CRM
Versions
4.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-09T00:32:07.090Z
Updated
2025-09-09T00:32:07.090Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection with a publicly available exploit makes automated exploitation highly likely.

Why this matters

In a Small CRM, an attacker can exfiltrate or modify customer data, credentials, or records, with potential regulatory and reputational impact. The public availability of the exploit lowers the bar for attackers and can enable rapid automated campaigns against exposed deployments.

Most likely attack path

No authentication required, exploiting via /profile.php with crafted Name input (AV:N, AC:L, UI:N). The attacker can trigger data leakage or modification with low complexity; lateral movement is unlikely beyond the application’s database due to scope restrictions, but data disclosure or tampering within the CRM is plausible.

Who is most exposed

Publicly reachable, self-hosted PHP-based Small CRM instances are the primary risk; any organisation running 4.0 on internet-facing infrastructure without strong WAF, input validation, or DB access controls is affected.

Detection ideas

  • Unusual or malformed input patterns to the Name parameter in profile.php; SQL syntax fragments in logs.
  • Database error messages appearing in application logs or responses.
  • Elevated query latency or unusual DB activity around profile retrieval/update.
  • WAF/IDS alerts for SQLi payloads targeting profile.php.
  • Repeated failed or anomalous login or data access attempts from unfamiliar IPs.

Mitigation and prioritisation

  • Apply available patch or upgrade to a fixed release; verify vendor advisory and test in staging.
  • Enforce parameterised queries and strong input validation for all user inputs, especially Name in profile.php.
  • Restrict DB privileges of the web-app account; use least privilege and separate read/write roles.
  • Deploy or tune a web application firewall to block common SQLi patterns; enable logging and alerting.
  • Change-management: schedule deployment with back-out plan; monitor for data exfiltration indicators post-patch. If KEV true or EPSS ≥ 0.5 were known, escalate to priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.