CVE-2024-25894: n/a
ChurchCRM 5.5.0 /EventEditor.php is vulnerable to Blind SQL Injection (Time-based) via the EventCount POST parameter.
AI Analysis
Technical Summary
CVE-2024-25894 identifies a critical Blind SQL Injection vulnerability in ChurchCRM version 5.5.0, specifically in the EventEditor.php file. The vulnerability arises from improper sanitization of the EventCount POST parameter, allowing attackers to inject malicious SQL payloads. This is a time-based blind SQL injection, meaning attackers can infer database responses by measuring response delays, enabling them to extract sensitive data or manipulate the database without direct feedback. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can potentially read, modify, or delete data and disrupt application functionality. Although no public exploits have been reported yet, the vulnerability's nature and criticality suggest that exploitation could lead to full compromise of the ChurchCRM backend database. ChurchCRM is an open-source church management software used globally to manage events, memberships, and donations, making this vulnerability particularly dangerous for organizations relying on it for sensitive community data. No official patches or fixes have been published at the time of disclosure, increasing the urgency for organizations to implement interim mitigations.
Potential Impact
The impact of CVE-2024-25894 is severe for organizations using ChurchCRM 5.5.0. Exploitation can lead to unauthorized disclosure of sensitive data such as member information, event details, and donation records, violating confidentiality. Attackers can also alter or delete data, compromising data integrity and potentially disrupting church operations and trust. The availability of the application may be affected if attackers execute destructive SQL commands or cause database lockups. Since no authentication is required, any remote attacker can exploit this vulnerability, increasing the attack surface significantly. The breach of sensitive community data can have reputational consequences and legal implications, especially in jurisdictions with strict data protection regulations. Organizations may face operational downtime and costly incident response efforts. The lack of patches means the vulnerability remains exploitable until mitigations or updates are applied.
Mitigation Recommendations
1. Immediately restrict external access to the EventEditor.php endpoint, ideally limiting it to trusted internal networks or VPN users. 2. Deploy a Web Application Firewall (WAF) with rules specifically targeting SQL injection patterns, including time-based blind SQLi detection. 3. Conduct thorough input validation and sanitization on all POST parameters, especially EventCount, to prevent injection attacks. 4. Monitor application logs and database query patterns for anomalies indicative of SQL injection attempts, such as unusual delays or malformed queries. 5. If possible, downgrade or temporarily disable the vulnerable functionality until a patch is released. 6. Engage with the ChurchCRM development community or vendor to obtain or contribute to a security patch addressing this vulnerability. 7. Educate administrators and users about the risk and signs of exploitation to enable rapid detection and response. 8. Regularly back up the database and verify backup integrity to enable recovery in case of data corruption or loss. 9. Consider deploying database activity monitoring tools to detect and alert on suspicious SQL commands. 10. Plan for rapid patch deployment once an official fix becomes available.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, France, Brazil, South Africa, New Zealand, Ireland
CVE-2024-25894: n/a
Description
ChurchCRM 5.5.0 /EventEditor.php is vulnerable to Blind SQL Injection (Time-based) via the EventCount POST parameter.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-25894 identifies a critical Blind SQL Injection vulnerability in ChurchCRM version 5.5.0, specifically in the EventEditor.php file. The vulnerability arises from improper sanitization of the EventCount POST parameter, allowing attackers to inject malicious SQL payloads. This is a time-based blind SQL injection, meaning attackers can infer database responses by measuring response delays, enabling them to extract sensitive data or manipulate the database without direct feedback. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can potentially read, modify, or delete data and disrupt application functionality. Although no public exploits have been reported yet, the vulnerability's nature and criticality suggest that exploitation could lead to full compromise of the ChurchCRM backend database. ChurchCRM is an open-source church management software used globally to manage events, memberships, and donations, making this vulnerability particularly dangerous for organizations relying on it for sensitive community data. No official patches or fixes have been published at the time of disclosure, increasing the urgency for organizations to implement interim mitigations.
Potential Impact
The impact of CVE-2024-25894 is severe for organizations using ChurchCRM 5.5.0. Exploitation can lead to unauthorized disclosure of sensitive data such as member information, event details, and donation records, violating confidentiality. Attackers can also alter or delete data, compromising data integrity and potentially disrupting church operations and trust. The availability of the application may be affected if attackers execute destructive SQL commands or cause database lockups. Since no authentication is required, any remote attacker can exploit this vulnerability, increasing the attack surface significantly. The breach of sensitive community data can have reputational consequences and legal implications, especially in jurisdictions with strict data protection regulations. Organizations may face operational downtime and costly incident response efforts. The lack of patches means the vulnerability remains exploitable until mitigations or updates are applied.
Mitigation Recommendations
1. Immediately restrict external access to the EventEditor.php endpoint, ideally limiting it to trusted internal networks or VPN users. 2. Deploy a Web Application Firewall (WAF) with rules specifically targeting SQL injection patterns, including time-based blind SQLi detection. 3. Conduct thorough input validation and sanitization on all POST parameters, especially EventCount, to prevent injection attacks. 4. Monitor application logs and database query patterns for anomalies indicative of SQL injection attempts, such as unusual delays or malformed queries. 5. If possible, downgrade or temporarily disable the vulnerable functionality until a patch is released. 6. Engage with the ChurchCRM development community or vendor to obtain or contribute to a security patch addressing this vulnerability. 7. Educate administrators and users about the risk and signs of exploitation to enable rapid detection and response. 8. Regularly back up the database and verify backup integrity to enable recovery in case of data corruption or loss. 9. Consider deploying database activity monitoring tools to detect and alert on suspicious SQL commands. 10. Plan for rapid patch deployment once an official fix becomes available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-12T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d73b7ef31ef0b572413
Added to database: 2/25/2026, 9:45:23 PM
Last enriched: 2/28/2026, 9:59:29 AM
Last updated: 4/11/2026, 7:02:02 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.