Skip to main content

CVE-2024-25897: n/a in n/a

Critical
VulnerabilityCVE-2024-25897cvecve-2024-25897n-acwe-89
Published: Wed Feb 21 2024 (02/21/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

ChurchCRM 5.5.0 FRCatalog.php is vulnerable to Blind SQL Injection (Time-based) via the CurrentFundraiser GET parameter.

AI-Powered Analysis

AILast updated: 06/21/2025, 15:38:16 UTC

Technical Analysis

CVE-2024-25897 is a critical Blind SQL Injection vulnerability identified in ChurchCRM version 5.5.0, specifically within the FRCatalog.php script. The vulnerability arises from improper sanitization of the 'CurrentFundraiser' GET parameter, which allows an unauthenticated remote attacker to inject malicious SQL queries. This injection is time-based and blind, meaning the attacker can infer database responses by measuring response delays, despite not receiving direct query output. Exploiting this flaw can lead to full compromise of the backend database, enabling unauthorized disclosure (confidentiality impact), modification (integrity impact), and deletion or disruption (availability impact) of data. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 9.8, reflecting its critical severity with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the ease of exploitation and severity make it a significant threat. ChurchCRM is an open-source church management system used to manage membership, donations, and events, often containing sensitive personal and financial data. The vulnerability's CWE classification is CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). No official patches or vendor advisories are currently linked, indicating that organizations must be vigilant and apply mitigations promptly once available.

Potential Impact

For European organizations, particularly religious institutions, non-profits, and community groups using ChurchCRM, this vulnerability poses a severe risk. Exploitation could lead to unauthorized access to sensitive personal data of congregants, including contact information and donation records, violating data protection regulations such as GDPR. The integrity of financial records could be compromised, potentially facilitating fraud or financial misreporting. Availability impacts could disrupt organizational operations, including event management and communication. Given the criticality and ease of exploitation, attackers could leverage this vulnerability for data exfiltration, ransomware deployment, or as a foothold for further network intrusion. The reputational damage and regulatory penalties resulting from data breaches could be substantial. Additionally, since ChurchCRM is often deployed in smaller organizations with limited cybersecurity resources, the risk of successful exploitation is heightened.

Mitigation Recommendations

1. Immediate mitigation should include restricting external access to the vulnerable FRCatalog.php endpoint, ideally via network-level controls such as firewalls or web application firewalls (WAFs) configured to detect and block SQL injection patterns, especially time-based anomalies. 2. Organizations should conduct thorough input validation and sanitization on all GET parameters, particularly 'CurrentFundraiser', employing parameterized queries or prepared statements to eliminate SQL injection vectors. 3. Monitor web server and application logs for unusual query patterns or response delays indicative of time-based SQL injection attempts. 4. Implement strict access controls and segmentation to limit the impact of potential compromise. 5. Regularly back up databases and critical data to enable recovery in case of data corruption or deletion. 6. Engage with the ChurchCRM community or maintainers to obtain patches or updates addressing this vulnerability as soon as they become available. 7. Conduct security awareness training for administrators managing ChurchCRM deployments to recognize and respond to suspicious activities. 8. Consider deploying runtime application self-protection (RASP) tools that can detect and block injection attacks in real time. 9. If immediate patching is not possible, consider temporarily disabling the vulnerable functionality or migrating to alternative solutions until a fix is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-12T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6b2d

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 3:38:16 PM

Last updated: 8/17/2025, 7:37:29 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats