Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11529: Missing Authentication in ChurchCRM

0
Medium
VulnerabilityCVE-2025-11529cvecve-2025-11529
Published: Thu Oct 09 2025 (10/09/2025, 03:02:11 UTC)
Source: CVE Database V5
Product: ChurchCRM

Description

CVE-2025-11529 is a medium severity vulnerability in ChurchCRM versions up to 5. 18. 0, caused by missing authentication in the AuthMiddleware component of the API endpoint. This flaw allows an unauthenticated remote attacker to access API functions without proper verification, potentially exposing sensitive data or enabling unauthorized actions. The vulnerability does not require user interaction or privileges, making exploitation straightforward over the network. A patch has been released and should be applied promptly to mitigate the risk. European organizations using ChurchCRM, especially faith-based and community organizations, should prioritize updating to secure their systems. The vulnerability's CVSS score is 6. 9, reflecting its moderate impact on confidentiality, integrity, and availability. Countries with higher adoption of ChurchCRM or significant religious community infrastructures are more likely to be affected.

AI-Powered Analysis

AILast updated: 10/16/2025, 08:54:58 UTC

Technical Analysis

CVE-2025-11529 identifies a security vulnerability in ChurchCRM, an open-source church management software, affecting all versions up to 5.18.0. The flaw resides in the AuthMiddleware.php file within the API endpoint component, where authentication checks are missing or improperly enforced. This allows remote attackers to bypass authentication controls entirely, gaining unauthorized access to API functions. Since the vulnerability requires no privileges or user interaction and is exploitable remotely, it presents a significant risk of unauthorized data access or manipulation. The vulnerability was publicly disclosed on October 9, 2025, with a patch available identified by commit 3a1cffd2aea63d884025949cfbcfd274d06216a4. The CVSS v4.0 base score of 6.9 reflects a medium severity, considering the network attack vector, low complexity, and no required authentication or user interaction. The impact includes potential confidentiality breaches, integrity violations, and availability disruptions due to unauthorized API access. Although no known exploits are currently active in the wild, the public availability of the exploit code increases the risk of imminent attacks. The vulnerability affects a broad range of ChurchCRM versions, necessitating urgent remediation for all impacted deployments.

Potential Impact

For European organizations, especially churches, religious institutions, and community groups relying on ChurchCRM for managing member data, events, and communications, this vulnerability poses a significant risk. Unauthorized access to the API could lead to exposure of sensitive personal data, such as member contact information, donation records, and internal communications, violating GDPR and other data protection regulations. Integrity of data could be compromised by unauthorized modifications, potentially disrupting organizational operations and trust. Availability could also be affected if attackers manipulate or disable API functions. Given the ease of exploitation and the public availability of exploit code, attackers could rapidly target vulnerable European organizations. This could result in reputational damage, legal penalties, and operational disruptions. Organizations with limited IT security resources or those slow to apply patches are particularly vulnerable. The impact is amplified in countries with larger or more digitally integrated faith communities using ChurchCRM.

Mitigation Recommendations

Organizations should immediately apply the official patch identified by commit 3a1cffd2aea63d884025949cfbcfd274d06216a4 to all affected ChurchCRM instances. If patching is temporarily not possible, restrict network access to the ChurchCRM API endpoints using firewall rules or VPNs to limit exposure. Implement additional authentication layers such as web application firewalls (WAF) with custom rules to detect and block unauthorized API requests. Conduct thorough audits of API access logs to identify any suspicious or unauthorized activity. Review and tighten API permissions and roles within ChurchCRM to minimize potential damage from unauthorized access. Regularly update ChurchCRM and monitor vendor advisories for further security updates. Educate IT staff and administrators about the vulnerability and the importance of timely patching. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting ChurchCRM APIs. Finally, ensure data backups are current and tested to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-08T19:05:38.194Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e727b132de7eb26af7f8f1

Added to database: 10/9/2025, 3:10:41 AM

Last enriched: 10/16/2025, 8:54:58 AM

Last updated: 11/21/2025, 4:44:10 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats