CVE-2025-11529: Missing Authentication in ChurchCRM
CVE-2025-11529 is a medium severity vulnerability in ChurchCRM versions up to 5. 18. 0, caused by missing authentication in the AuthMiddleware component of the API endpoint. This flaw allows an unauthenticated remote attacker to access API functions without proper verification, potentially exposing sensitive data or enabling unauthorized actions. The vulnerability does not require user interaction or privileges, making exploitation straightforward over the network. A patch has been released and should be applied promptly to mitigate the risk. European organizations using ChurchCRM, especially faith-based and community organizations, should prioritize updating to secure their systems. The vulnerability's CVSS score is 6. 9, reflecting its moderate impact on confidentiality, integrity, and availability. Countries with higher adoption of ChurchCRM or significant religious community infrastructures are more likely to be affected.
AI Analysis
Technical Summary
CVE-2025-11529 identifies a security vulnerability in ChurchCRM, an open-source church management software, affecting all versions up to 5.18.0. The flaw resides in the AuthMiddleware.php file within the API endpoint component, where authentication checks are missing or improperly enforced. This allows remote attackers to bypass authentication controls entirely, gaining unauthorized access to API functions. Since the vulnerability requires no privileges or user interaction and is exploitable remotely, it presents a significant risk of unauthorized data access or manipulation. The vulnerability was publicly disclosed on October 9, 2025, with a patch available identified by commit 3a1cffd2aea63d884025949cfbcfd274d06216a4. The CVSS v4.0 base score of 6.9 reflects a medium severity, considering the network attack vector, low complexity, and no required authentication or user interaction. The impact includes potential confidentiality breaches, integrity violations, and availability disruptions due to unauthorized API access. Although no known exploits are currently active in the wild, the public availability of the exploit code increases the risk of imminent attacks. The vulnerability affects a broad range of ChurchCRM versions, necessitating urgent remediation for all impacted deployments.
Potential Impact
For European organizations, especially churches, religious institutions, and community groups relying on ChurchCRM for managing member data, events, and communications, this vulnerability poses a significant risk. Unauthorized access to the API could lead to exposure of sensitive personal data, such as member contact information, donation records, and internal communications, violating GDPR and other data protection regulations. Integrity of data could be compromised by unauthorized modifications, potentially disrupting organizational operations and trust. Availability could also be affected if attackers manipulate or disable API functions. Given the ease of exploitation and the public availability of exploit code, attackers could rapidly target vulnerable European organizations. This could result in reputational damage, legal penalties, and operational disruptions. Organizations with limited IT security resources or those slow to apply patches are particularly vulnerable. The impact is amplified in countries with larger or more digitally integrated faith communities using ChurchCRM.
Mitigation Recommendations
Organizations should immediately apply the official patch identified by commit 3a1cffd2aea63d884025949cfbcfd274d06216a4 to all affected ChurchCRM instances. If patching is temporarily not possible, restrict network access to the ChurchCRM API endpoints using firewall rules or VPNs to limit exposure. Implement additional authentication layers such as web application firewalls (WAF) with custom rules to detect and block unauthorized API requests. Conduct thorough audits of API access logs to identify any suspicious or unauthorized activity. Review and tighten API permissions and roles within ChurchCRM to minimize potential damage from unauthorized access. Regularly update ChurchCRM and monitor vendor advisories for further security updates. Educate IT staff and administrators about the vulnerability and the importance of timely patching. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting ChurchCRM APIs. Finally, ensure data backups are current and tested to enable recovery in case of compromise.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Ireland
CVE-2025-11529: Missing Authentication in ChurchCRM
Description
CVE-2025-11529 is a medium severity vulnerability in ChurchCRM versions up to 5. 18. 0, caused by missing authentication in the AuthMiddleware component of the API endpoint. This flaw allows an unauthenticated remote attacker to access API functions without proper verification, potentially exposing sensitive data or enabling unauthorized actions. The vulnerability does not require user interaction or privileges, making exploitation straightforward over the network. A patch has been released and should be applied promptly to mitigate the risk. European organizations using ChurchCRM, especially faith-based and community organizations, should prioritize updating to secure their systems. The vulnerability's CVSS score is 6. 9, reflecting its moderate impact on confidentiality, integrity, and availability. Countries with higher adoption of ChurchCRM or significant religious community infrastructures are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-11529 identifies a security vulnerability in ChurchCRM, an open-source church management software, affecting all versions up to 5.18.0. The flaw resides in the AuthMiddleware.php file within the API endpoint component, where authentication checks are missing or improperly enforced. This allows remote attackers to bypass authentication controls entirely, gaining unauthorized access to API functions. Since the vulnerability requires no privileges or user interaction and is exploitable remotely, it presents a significant risk of unauthorized data access or manipulation. The vulnerability was publicly disclosed on October 9, 2025, with a patch available identified by commit 3a1cffd2aea63d884025949cfbcfd274d06216a4. The CVSS v4.0 base score of 6.9 reflects a medium severity, considering the network attack vector, low complexity, and no required authentication or user interaction. The impact includes potential confidentiality breaches, integrity violations, and availability disruptions due to unauthorized API access. Although no known exploits are currently active in the wild, the public availability of the exploit code increases the risk of imminent attacks. The vulnerability affects a broad range of ChurchCRM versions, necessitating urgent remediation for all impacted deployments.
Potential Impact
For European organizations, especially churches, religious institutions, and community groups relying on ChurchCRM for managing member data, events, and communications, this vulnerability poses a significant risk. Unauthorized access to the API could lead to exposure of sensitive personal data, such as member contact information, donation records, and internal communications, violating GDPR and other data protection regulations. Integrity of data could be compromised by unauthorized modifications, potentially disrupting organizational operations and trust. Availability could also be affected if attackers manipulate or disable API functions. Given the ease of exploitation and the public availability of exploit code, attackers could rapidly target vulnerable European organizations. This could result in reputational damage, legal penalties, and operational disruptions. Organizations with limited IT security resources or those slow to apply patches are particularly vulnerable. The impact is amplified in countries with larger or more digitally integrated faith communities using ChurchCRM.
Mitigation Recommendations
Organizations should immediately apply the official patch identified by commit 3a1cffd2aea63d884025949cfbcfd274d06216a4 to all affected ChurchCRM instances. If patching is temporarily not possible, restrict network access to the ChurchCRM API endpoints using firewall rules or VPNs to limit exposure. Implement additional authentication layers such as web application firewalls (WAF) with custom rules to detect and block unauthorized API requests. Conduct thorough audits of API access logs to identify any suspicious or unauthorized activity. Review and tighten API permissions and roles within ChurchCRM to minimize potential damage from unauthorized access. Regularly update ChurchCRM and monitor vendor advisories for further security updates. Educate IT staff and administrators about the vulnerability and the importance of timely patching. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting ChurchCRM APIs. Finally, ensure data backups are current and tested to enable recovery in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-08T19:05:38.194Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e727b132de7eb26af7f8f1
Added to database: 10/9/2025, 3:10:41 AM
Last enriched: 10/16/2025, 8:54:58 AM
Last updated: 11/21/2025, 4:44:10 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30801: CWE-1392: Use of Default Credentials in qBittorrent qBittorrent client
CriticalCVE-2023-30800: CWE-787 Out-of-bounds Write in MikroTik RouterOS
HighCVE-2023-30799: CWE-269 Improper Privilege Management in MikroTik RouterOS
CriticalCVE-2023-30798: CWE-400 Uncontrolled Resource Consumption in Encode Starlette
HighCVE-2023-30797: CWE-330 Use of Insufficiently Random Values in Netflix Lemur
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.