CVE Alert: CVE-2025-11503 – PHPGurukul – Beauty Parlour Management System

CVE-2025-11503

HIGHNo exploitation knownPoC observed

A vulnerability was determined in PHPGurukul Beauty Parlour Management System 1.1. This issue affects some unknown processing of the file /admin/manage-services.php. Executing manipulation of the argument delid can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
PHPGurukul
Product
Beauty Parlour Management System
Versions
1.1
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-08T20:02:11.395Z
Updated
2025-10-08T20:18:35.484Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection with a publicly disclosed PoC; exploitation could lead to data exposure or modification.

Why this matters

Attackers can target the admin panel to extract or alter data without user interaction, potentially impacting customers and operations. The public exploit increases the chance of automated scanning and rapid weaponisation against exposed installations.

Most likely attack path

Remote attack via the delid parameter in /admin/manage-services.php using crafted input to trigger SQL injection. No authentication required and no user interaction needed, enabling automated probes over the network. Limited to database-level impact but could enable data access or modification; persistence or lateral movement depends on app and DB privileges.

Who is most exposed

organisations hosting this PHP-based management system on internet-exposed servers (typical small-to-mid sized deployments on LAMP/MEAN stacks) are at highest risk, especially where the admin interface is not behind strong access controls.

Detection ideas

  • Sudden spikes of requests to /admin/manage-services.php with SQL-like payloads.
  • SQL error messages or abnormal DB errors in web/app logs.
  • Unusual authentication/authorization failures from admin endpoints.
  • WAF alerts for SQLi signatures targeting the delid parameter.
  • Unexplained data reads/exports following admin requests.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a fixed version; if unavailable, implement strict input handling and convert the delid parameter to a parameterised query.
  • Enforce strong access controls: IP allowlisting, MFA, and segregated admin networks; disable internet exposure of the admin panel where feasible.
  • Add WAF/IPS rules to block SQLi patterns targeting this endpoint; monitor for anomalous DB activity.
  • Conduct patch testing in a staging environment; schedule rapid remediation if indicators appear in production.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.