CVE-2024-25897: n/a in n/a
ChurchCRM 5.5.0 FRCatalog.php is vulnerable to Blind SQL Injection (Time-based) via the CurrentFundraiser GET parameter.
AI Analysis
Technical Summary
CVE-2024-25897 is a critical Blind SQL Injection vulnerability identified in ChurchCRM version 5.5.0, specifically within the FRCatalog.php script. The vulnerability arises from improper sanitization of the 'CurrentFundraiser' GET parameter, which allows an unauthenticated remote attacker to inject malicious SQL queries. This injection is time-based and blind, meaning the attacker can infer database responses by measuring response delays, despite not receiving direct query output. Exploiting this flaw can lead to full compromise of the backend database, enabling unauthorized disclosure (confidentiality impact), modification (integrity impact), and deletion or disruption (availability impact) of data. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 9.8, reflecting its critical severity with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat. ChurchCRM is an open-source church management system used to manage membership, donations, and events, often containing sensitive personal and financial data. The vulnerability's CWE classification is CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). No official patches or vendor advisories are currently linked, indicating that organizations must be vigilant and apply mitigations promptly once available.
Potential Impact
For European organizations, particularly religious institutions, non-profits, and community groups using ChurchCRM, this vulnerability poses a severe risk. Exploitation could lead to unauthorized access to sensitive personal data of congregants, including contact information and donation records, violating data protection regulations such as GDPR. The integrity of financial records could be compromised, potentially facilitating fraud or financial misreporting. Availability impacts could disrupt organizational operations, including event management and communication. Given the criticality and ease of exploitation, attackers could leverage this vulnerability for data exfiltration, ransomware deployment, or as a foothold for further network intrusion. The reputational damage and regulatory penalties resulting from data breaches could be substantial. Additionally, since ChurchCRM is often deployed in smaller organizations with limited cybersecurity resources, the risk of successful exploitation is heightened.
Mitigation Recommendations
1. Immediate mitigation should include restricting external access to the vulnerable FRCatalog.php endpoint, ideally via network-level controls such as firewalls or web application firewalls (WAFs) configured to detect and block SQL injection patterns, especially time-based anomalies. 2. Organizations should conduct thorough input validation and sanitization on all GET parameters, particularly 'CurrentFundraiser', employing parameterized queries or prepared statements to eliminate SQL injection vectors. 3. Monitor web server and application logs for unusual query patterns or response delays indicative of time-based SQL injection attempts. 4. Implement strict access controls and segmentation to limit the impact of potential compromise. 5. Regularly back up databases and critical data to enable recovery in case of data corruption or deletion. 6. Engage with the ChurchCRM community or maintainers to obtain patches or updates addressing this vulnerability as soon as they become available. 7. Conduct security awareness training for administrators managing ChurchCRM deployments to recognize and respond to suspicious activities. 8. Consider deploying runtime application self-protection (RASP) tools that can detect and block injection attacks in real time. 9. If immediate patching is not possible, consider temporarily disabling the vulnerable functionality or migrating to alternative solutions until a fix is released.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Ireland
CVE-2024-25897: n/a in n/a
Description
ChurchCRM 5.5.0 FRCatalog.php is vulnerable to Blind SQL Injection (Time-based) via the CurrentFundraiser GET parameter.
AI-Powered Analysis
Technical Analysis
CVE-2024-25897 is a critical Blind SQL Injection vulnerability identified in ChurchCRM version 5.5.0, specifically within the FRCatalog.php script. The vulnerability arises from improper sanitization of the 'CurrentFundraiser' GET parameter, which allows an unauthenticated remote attacker to inject malicious SQL queries. This injection is time-based and blind, meaning the attacker can infer database responses by measuring response delays, despite not receiving direct query output. Exploiting this flaw can lead to full compromise of the backend database, enabling unauthorized disclosure (confidentiality impact), modification (integrity impact), and deletion or disruption (availability impact) of data. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 9.8, reflecting its critical severity with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat. ChurchCRM is an open-source church management system used to manage membership, donations, and events, often containing sensitive personal and financial data. The vulnerability's CWE classification is CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). No official patches or vendor advisories are currently linked, indicating that organizations must be vigilant and apply mitigations promptly once available.
Potential Impact
For European organizations, particularly religious institutions, non-profits, and community groups using ChurchCRM, this vulnerability poses a severe risk. Exploitation could lead to unauthorized access to sensitive personal data of congregants, including contact information and donation records, violating data protection regulations such as GDPR. The integrity of financial records could be compromised, potentially facilitating fraud or financial misreporting. Availability impacts could disrupt organizational operations, including event management and communication. Given the criticality and ease of exploitation, attackers could leverage this vulnerability for data exfiltration, ransomware deployment, or as a foothold for further network intrusion. The reputational damage and regulatory penalties resulting from data breaches could be substantial. Additionally, since ChurchCRM is often deployed in smaller organizations with limited cybersecurity resources, the risk of successful exploitation is heightened.
Mitigation Recommendations
1. Immediate mitigation should include restricting external access to the vulnerable FRCatalog.php endpoint, ideally via network-level controls such as firewalls or web application firewalls (WAFs) configured to detect and block SQL injection patterns, especially time-based anomalies. 2. Organizations should conduct thorough input validation and sanitization on all GET parameters, particularly 'CurrentFundraiser', employing parameterized queries or prepared statements to eliminate SQL injection vectors. 3. Monitor web server and application logs for unusual query patterns or response delays indicative of time-based SQL injection attempts. 4. Implement strict access controls and segmentation to limit the impact of potential compromise. 5. Regularly back up databases and critical data to enable recovery in case of data corruption or deletion. 6. Engage with the ChurchCRM community or maintainers to obtain patches or updates addressing this vulnerability as soon as they become available. 7. Conduct security awareness training for administrators managing ChurchCRM deployments to recognize and respond to suspicious activities. 8. Consider deploying runtime application self-protection (RASP) tools that can detect and block injection attacks in real time. 9. If immediate patching is not possible, consider temporarily disabling the vulnerable functionality or migrating to alternative solutions until a fix is released.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-12T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6b2d
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 3:38:16 PM
Last updated: 8/17/2025, 7:37:29 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.