Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25894: n/a

0
Critical
VulnerabilityCVE-2024-25894cvecve-2024-25894
Published: Wed Feb 21 2024 (02/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

ChurchCRM 5.5.0 /EventEditor.php is vulnerable to Blind SQL Injection (Time-based) via the EventCount POST parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:59:29 UTC

Technical Analysis

CVE-2024-25894 identifies a critical Blind SQL Injection vulnerability in ChurchCRM version 5.5.0, specifically in the EventEditor.php file. The vulnerability arises from improper sanitization of the EventCount POST parameter, allowing attackers to inject malicious SQL payloads. This is a time-based blind SQL injection, meaning attackers can infer database responses by measuring response delays, enabling them to extract sensitive data or manipulate the database without direct feedback. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can potentially read, modify, or delete data and disrupt application functionality. Although no public exploits have been reported yet, the vulnerability's nature and criticality suggest that exploitation could lead to full compromise of the ChurchCRM backend database. ChurchCRM is an open-source church management software used globally to manage events, memberships, and donations, making this vulnerability particularly dangerous for organizations relying on it for sensitive community data. No official patches or fixes have been published at the time of disclosure, increasing the urgency for organizations to implement interim mitigations.

Potential Impact

The impact of CVE-2024-25894 is severe for organizations using ChurchCRM 5.5.0. Exploitation can lead to unauthorized disclosure of sensitive data such as member information, event details, and donation records, violating confidentiality. Attackers can also alter or delete data, compromising data integrity and potentially disrupting church operations and trust. The availability of the application may be affected if attackers execute destructive SQL commands or cause database lockups. Since no authentication is required, any remote attacker can exploit this vulnerability, increasing the attack surface significantly. The breach of sensitive community data can have reputational consequences and legal implications, especially in jurisdictions with strict data protection regulations. Organizations may face operational downtime and costly incident response efforts. The lack of patches means the vulnerability remains exploitable until mitigations or updates are applied.

Mitigation Recommendations

1. Immediately restrict external access to the EventEditor.php endpoint, ideally limiting it to trusted internal networks or VPN users. 2. Deploy a Web Application Firewall (WAF) with rules specifically targeting SQL injection patterns, including time-based blind SQLi detection. 3. Conduct thorough input validation and sanitization on all POST parameters, especially EventCount, to prevent injection attacks. 4. Monitor application logs and database query patterns for anomalies indicative of SQL injection attempts, such as unusual delays or malformed queries. 5. If possible, downgrade or temporarily disable the vulnerable functionality until a patch is released. 6. Engage with the ChurchCRM development community or vendor to obtain or contribute to a security patch addressing this vulnerability. 7. Educate administrators and users about the risk and signs of exploitation to enable rapid detection and response. 8. Regularly back up the database and verify backup integrity to enable recovery in case of data corruption or loss. 9. Consider deploying database activity monitoring tools to detect and alert on suspicious SQL commands. 10. Plan for rapid patch deployment once an official fix becomes available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d73b7ef31ef0b572413

Added to database: 2/25/2026, 9:45:23 PM

Last enriched: 2/28/2026, 9:59:29 AM

Last updated: 4/11/2026, 7:02:02 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses