Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11938: Deserialization in ChurchCRM

0
Medium
VulnerabilityCVE-2025-11938cvecve-2025-11938
Published: Sun Oct 19 2025 (10/19/2025, 07:32:05 UTC)
Source: CVE Database V5
Product: ChurchCRM

Description

A vulnerability was found in ChurchCRM up to 5.18.0. This vulnerability affects unknown code of the file setup/routes/setup.php. Performing a manipulation of the argument DB_PASSWORD/ROOT_PATH/URL results in deserialization. The attack may be initiated remotely. The attack's complexity is rated as high. It is stated that the exploitability is difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:34:10 UTC

Technical Analysis

CVE-2025-11938 is a medium-severity deserialization vulnerability affecting ChurchCRM versions 5.0 through 5.18.0. The flaw exists in the setup/routes/setup.php file, where manipulation of certain input parameters—specifically DB_PASSWORD, ROOT_PATH, or URL—can trigger unsafe deserialization of data. Deserialization vulnerabilities occur when untrusted data is processed by an application’s deserialization routines, potentially allowing attackers to execute arbitrary code, escalate privileges, or cause denial of service. In this case, the vulnerability can be exploited remotely without authentication or user interaction, although the attack complexity is rated high, indicating that exploitation requires significant skill or specific conditions. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges or user interaction needed, and low impact on confidentiality, integrity, and availability. The vendor was notified but has not responded or issued a patch, and no official patch links are available. While no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of future attacks. ChurchCRM is a widely used open-source church management system, making this vulnerability relevant to many religious and community organizations globally.

Potential Impact

If exploited, this vulnerability could allow remote attackers to execute arbitrary code or manipulate the application’s behavior by exploiting unsafe deserialization. This could lead to unauthorized access to sensitive data such as member information, financial records, or internal communications managed by ChurchCRM. The integrity of the application and its data could be compromised, potentially disrupting church operations or community services. Although the CVSS score indicates medium severity, the real-world impact could be significant for organizations relying heavily on ChurchCRM for their daily operations. The lack of vendor response and patches increases the window of exposure. Given the attack complexity is high, widespread exploitation may be limited initially, but skilled attackers could leverage this vulnerability for targeted attacks. The vulnerability’s remote exploitability without authentication makes it a notable risk for exposed ChurchCRM installations.

Mitigation Recommendations

Organizations should immediately review their ChurchCRM deployments and restrict access to the setup routes, especially the setup.php file, via network controls such as firewalls or web application firewalls (WAFs). Implement input validation and sanitization on the affected parameters (DB_PASSWORD, ROOT_PATH, URL) to prevent malicious serialized data from being processed. If possible, disable or restrict deserialization routines in the application or apply custom patches to sanitize inputs before deserialization. Monitor network traffic and application logs for unusual requests targeting setup.php or attempts to manipulate these parameters. Consider isolating ChurchCRM instances in segmented network zones to limit exposure. Stay alert for official patches or updates from the vendor and apply them promptly once available. In the absence of vendor patches, consider engaging with the ChurchCRM community or security experts to develop interim fixes. Regularly back up ChurchCRM data to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-18T12:54:26.566Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f4954ddd9718ca70979f34

Added to database: 10/19/2025, 7:37:49 AM

Last enriched: 2/24/2026, 9:34:10 PM

Last updated: 3/24/2026, 7:37:18 AM

Views: 241

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses