CVE-2025-10664
Small · Small Multiple Products, specifically PHPGurukul Small CRM
A high-severity vulnerability has been identified in the PHPGurukul Small CRM software, which could allow an attacker to access or manipulate sensitive customer data.
Executive summary
A high-severity vulnerability has been identified in the PHPGurukul Small CRM software, which could allow an attacker to access or manipulate sensitive customer data. Successful exploitation could lead to a significant data breach, impacting business operations and customer trust. Organizations are strongly advised to apply the vendor-provided security patches immediately to mitigate this risk.
Vulnerability
The vulnerability is an SQL injection flaw within the customer management module of the PHPGurukul Small CRM application. An authenticated, low-privileged user can exploit this by sending a specially crafted HTTP request with malicious SQL syntax to a vulnerable API endpoint. Due to improper input sanitization, the malicious query is executed directly against the backend database, allowing the attacker to bypass access controls and exfiltrate, modify, or delete sensitive information from the entire CRM database.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Exploitation could have a severe business impact, including the unauthorized disclosure of sensitive customer data such as Personally Identifiable Information (PII), contact details, and sales records. This could result in significant reputational damage, loss of customer confidence, regulatory fines under data protection laws like GDPR, and disruption to sales and customer relationship management activities that depend on the integrity of the CRM data.
Remediation
Immediate Action: The primary and most effective remediation is to apply the security updates provided by the vendor across all affected systems immediately. Prioritize patching for internet-facing instances of the CRM. After patching, it is crucial to monitor systems for any signs of attempted or successful exploitation by reviewing application and web server access logs for suspicious activity.
Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes reviewing database logs for unusual or malformed SQL queries, analyzing web server logs for repeated requests to specific endpoints with suspicious parameters, and configuring Web Application Firewall (WAF) alerts to detect and block common SQL injection patterns (e.g., OR 1=1, UNION SELECT, comment characters).
Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. Deploy a Web Application Firewall (WAF) with strict SQL injection rulesets in front of the application. Additionally, restrict network access to the CRM application to only trusted IP addresses and enforce the principle of least privilege for database user accounts to limit the potential impact of a breach.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity of this vulnerability and its potential for a significant data breach, we recommend that organizations treat this as a high-priority issue. The primary course of action must be to apply the vendor-supplied patch immediately. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its impact makes it a prime candidate for future exploitation. A patch-or-mitigate strategy should be enacted without delay to protect sensitive customer data and prevent business disruption.