CVE-2025-11053
Small · Small Multiple Products
A high-severity vulnerability has been identified in PHPGurukul Small CRM version 4, which could allow an unauthenticated remote attacker to access and exfiltrate sensitive data from the underlying da.
Executive summary
A high-severity vulnerability has been identified in PHPGurukul Small CRM version 4, which could allow an unauthenticated remote attacker to access and exfiltrate sensitive data from the underlying database. Successful exploitation of this weakness could lead to a significant data breach, compromising customer information and other critical business data stored within the CRM.
Vulnerability
The vulnerability is a SQL injection weakness in an unauthenticated component of the PHPGurukul Small CRM application. An attacker can send a specially crafted HTTP request containing malicious SQL queries to a vulnerable endpoint. Due to insufficient input validation, these queries are executed directly against the application's database, allowing the attacker to bypass authentication, read, modify, or delete sensitive data.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Exploitation could have a significant business impact, including the unauthorized disclosure of sensitive customer data, personally identifiable information (PII), and internal business records. A successful attack could lead to a major data breach, resulting in reputational damage, loss of customer trust, regulatory fines, and potential financial losses associated with incident response and recovery.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately across all affected instances. After patching, it is crucial to review web server and database access logs for any signs of compromise or exploitation attempts that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring of the affected application. Security teams should inspect web server access logs for requests containing SQL syntax (e.g., UNION, SELECT, ' OR '1'='1') in URL parameters or form data. Database logs should be monitored for anomalous queries originating from the web application user account.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rulesets designed to detect and block SQL injection attacks. Additionally, consider restricting network access to the CRM application, allowing connections only from trusted IP addresses or networks until the patch can be applied.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 7.3) and the potential for a complete compromise of sensitive CRM data, it is strongly recommended that organizations prioritize the immediate deployment of the vendor-supplied security patches. Although this vulnerability is not yet on the CISA KEV list, its critical nature warrants urgent attention. If patching is delayed, the implementation of compensating controls, such as a WAF, is essential to mitigate the immediate risk of exploitation.