CVE-2025-11938: Deserialization in ChurchCRM
A vulnerability was found in ChurchCRM up to 5.18.0. This vulnerability affects unknown code of the file setup/routes/setup.php. Performing manipulation of the argument DB_PASSWORD/ROOT_PATH/URL results in deserialization. The attack may be initiated remotely. The attack's complexity is rated as high. It is stated that the exploitability is difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11938 identifies a deserialization vulnerability in ChurchCRM, an open-source church management software, affecting all versions up to 5.18.0. The flaw exists in the setup/routes/setup.php file, where manipulation of certain parameters—DB_PASSWORD, ROOT_PATH, and URL—can trigger unsafe deserialization of user-controlled data. Deserialization vulnerabilities occur when untrusted input is deserialized without proper validation, potentially allowing attackers to execute arbitrary code, escalate privileges, or cause denial of service. This vulnerability can be exploited remotely without requiring authentication or user interaction, but the attack complexity is rated high, indicating that exploitation requires significant skill or specific conditions. The CVSS 4.0 score is 6.3 (medium severity), reflecting limited confidentiality, integrity, and availability impacts with difficult exploitability. Although the exploit has been publicly disclosed, no confirmed active exploitation in the wild has been reported. The vendor was notified early but has not issued a patch or response, increasing the urgency for organizations to implement mitigations. The vulnerability affects a wide range of ChurchCRM versions, which are used primarily by religious organizations for managing member data, events, and communications. Successful exploitation could lead to unauthorized access to sensitive data, manipulation of church records, or disruption of services.
Potential Impact
For European organizations, particularly churches and religious institutions using ChurchCRM, this vulnerability poses a risk to the confidentiality and integrity of sensitive member and organizational data. Exploitation could allow attackers to execute arbitrary code on the server, potentially leading to data breaches, unauthorized data modification, or service outages. Given that ChurchCRM often contains personal information of congregants, including contact details and possibly financial data, a breach could have privacy and regulatory implications under GDPR. The availability of church management services could also be disrupted, impacting organizational operations and community activities. Although the attack complexity is high and no active exploits are known, the lack of vendor response and patch availability increases the risk exposure. European organizations with limited cybersecurity resources may be particularly vulnerable to targeted attacks leveraging this flaw.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict network access to the setup/routes/setup.php endpoint by limiting it to trusted IP addresses or internal networks to prevent remote exploitation. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious deserialization payloads or manipulation of DB_PASSWORD, ROOT_PATH, and URL parameters. 3) Conduct thorough input validation and sanitization on all parameters that influence deserialization processes, ensuring only expected data types and formats are accepted. 4) Monitor logs for unusual access patterns or error messages related to the setup routes. 5) Consider isolating ChurchCRM instances in segmented network zones with minimal privileges to limit potential impact. 6) Plan and test upgrades to newer versions once the vendor releases a patch addressing this vulnerability. 7) Educate administrators about the risks of deserialization vulnerabilities and the importance of timely updates. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vectors.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Poland
CVE-2025-11938: Deserialization in ChurchCRM
Description
A vulnerability was found in ChurchCRM up to 5.18.0. This vulnerability affects unknown code of the file setup/routes/setup.php. Performing manipulation of the argument DB_PASSWORD/ROOT_PATH/URL results in deserialization. The attack may be initiated remotely. The attack's complexity is rated as high. It is stated that the exploitability is difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11938 identifies a deserialization vulnerability in ChurchCRM, an open-source church management software, affecting all versions up to 5.18.0. The flaw exists in the setup/routes/setup.php file, where manipulation of certain parameters—DB_PASSWORD, ROOT_PATH, and URL—can trigger unsafe deserialization of user-controlled data. Deserialization vulnerabilities occur when untrusted input is deserialized without proper validation, potentially allowing attackers to execute arbitrary code, escalate privileges, or cause denial of service. This vulnerability can be exploited remotely without requiring authentication or user interaction, but the attack complexity is rated high, indicating that exploitation requires significant skill or specific conditions. The CVSS 4.0 score is 6.3 (medium severity), reflecting limited confidentiality, integrity, and availability impacts with difficult exploitability. Although the exploit has been publicly disclosed, no confirmed active exploitation in the wild has been reported. The vendor was notified early but has not issued a patch or response, increasing the urgency for organizations to implement mitigations. The vulnerability affects a wide range of ChurchCRM versions, which are used primarily by religious organizations for managing member data, events, and communications. Successful exploitation could lead to unauthorized access to sensitive data, manipulation of church records, or disruption of services.
Potential Impact
For European organizations, particularly churches and religious institutions using ChurchCRM, this vulnerability poses a risk to the confidentiality and integrity of sensitive member and organizational data. Exploitation could allow attackers to execute arbitrary code on the server, potentially leading to data breaches, unauthorized data modification, or service outages. Given that ChurchCRM often contains personal information of congregants, including contact details and possibly financial data, a breach could have privacy and regulatory implications under GDPR. The availability of church management services could also be disrupted, impacting organizational operations and community activities. Although the attack complexity is high and no active exploits are known, the lack of vendor response and patch availability increases the risk exposure. European organizations with limited cybersecurity resources may be particularly vulnerable to targeted attacks leveraging this flaw.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Restrict network access to the setup/routes/setup.php endpoint by limiting it to trusted IP addresses or internal networks to prevent remote exploitation. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious deserialization payloads or manipulation of DB_PASSWORD, ROOT_PATH, and URL parameters. 3) Conduct thorough input validation and sanitization on all parameters that influence deserialization processes, ensuring only expected data types and formats are accepted. 4) Monitor logs for unusual access patterns or error messages related to the setup routes. 5) Consider isolating ChurchCRM instances in segmented network zones with minimal privileges to limit potential impact. 6) Plan and test upgrades to newer versions once the vendor releases a patch addressing this vulnerability. 7) Educate administrators about the risks of deserialization vulnerabilities and the importance of timely updates. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vectors.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-18T12:54:26.566Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f4954ddd9718ca70979f34
Added to database: 10/19/2025, 7:37:49 AM
Last enriched: 10/27/2025, 1:20:43 AM
Last updated: 12/4/2025, 6:23:17 PM
Views: 120
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9127: CWE-116 Improper Encoding or Escaping of Output in Pure Storage PX Enterprise
HighCVE-2025-63363: n/a
UnknownCVE-2025-14012: SQL Injection in JIZHICMS
MediumCVE-2025-14011: SQL Injection in JIZHICMS
MediumCVE-2025-66373: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.