CVE-2025-11938: Deserialization in ChurchCRM
A vulnerability was found in ChurchCRM up to 5.18.0. This vulnerability affects unknown code of the file setup/routes/setup.php. Performing a manipulation of the argument DB_PASSWORD/ROOT_PATH/URL results in deserialization. The attack may be initiated remotely. The attack's complexity is rated as high. It is stated that the exploitability is difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11938 is a medium-severity deserialization vulnerability affecting ChurchCRM versions 5.0 through 5.18.0. The flaw exists in the setup/routes/setup.php file, where manipulation of certain input parameters—specifically DB_PASSWORD, ROOT_PATH, or URL—can trigger unsafe deserialization of data. Deserialization vulnerabilities occur when untrusted data is processed by an application’s deserialization routines, potentially allowing attackers to execute arbitrary code, escalate privileges, or cause denial of service. In this case, the vulnerability can be exploited remotely without authentication or user interaction, although the attack complexity is rated high, indicating that exploitation requires significant skill or specific conditions. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges or user interaction needed, and low impact on confidentiality, integrity, and availability. The vendor was notified but has not responded or issued a patch, and no official patch links are available. While no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of future attacks. ChurchCRM is a widely used open-source church management system, making this vulnerability relevant to many religious and community organizations globally.
Potential Impact
If exploited, this vulnerability could allow remote attackers to execute arbitrary code or manipulate the application’s behavior by exploiting unsafe deserialization. This could lead to unauthorized access to sensitive data such as member information, financial records, or internal communications managed by ChurchCRM. The integrity of the application and its data could be compromised, potentially disrupting church operations or community services. Although the CVSS score indicates medium severity, the real-world impact could be significant for organizations relying heavily on ChurchCRM for their daily operations. The lack of vendor response and patches increases the window of exposure. Given the attack complexity is high, widespread exploitation may be limited initially, but skilled attackers could leverage this vulnerability for targeted attacks. The vulnerability’s remote exploitability without authentication makes it a notable risk for exposed ChurchCRM installations.
Mitigation Recommendations
Organizations should immediately review their ChurchCRM deployments and restrict access to the setup routes, especially the setup.php file, via network controls such as firewalls or web application firewalls (WAFs). Implement input validation and sanitization on the affected parameters (DB_PASSWORD, ROOT_PATH, URL) to prevent malicious serialized data from being processed. If possible, disable or restrict deserialization routines in the application or apply custom patches to sanitize inputs before deserialization. Monitor network traffic and application logs for unusual requests targeting setup.php or attempts to manipulate these parameters. Consider isolating ChurchCRM instances in segmented network zones to limit exposure. Stay alert for official patches or updates from the vendor and apply them promptly once available. In the absence of vendor patches, consider engaging with the ChurchCRM community or security experts to develop interim fixes. Regularly back up ChurchCRM data to enable recovery in case of compromise.
Affected Countries
United States, Canada, United Kingdom, Australia, New Zealand, Ireland, South Africa
CVE-2025-11938: Deserialization in ChurchCRM
Description
A vulnerability was found in ChurchCRM up to 5.18.0. This vulnerability affects unknown code of the file setup/routes/setup.php. Performing a manipulation of the argument DB_PASSWORD/ROOT_PATH/URL results in deserialization. The attack may be initiated remotely. The attack's complexity is rated as high. It is stated that the exploitability is difficult. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11938 is a medium-severity deserialization vulnerability affecting ChurchCRM versions 5.0 through 5.18.0. The flaw exists in the setup/routes/setup.php file, where manipulation of certain input parameters—specifically DB_PASSWORD, ROOT_PATH, or URL—can trigger unsafe deserialization of data. Deserialization vulnerabilities occur when untrusted data is processed by an application’s deserialization routines, potentially allowing attackers to execute arbitrary code, escalate privileges, or cause denial of service. In this case, the vulnerability can be exploited remotely without authentication or user interaction, although the attack complexity is rated high, indicating that exploitation requires significant skill or specific conditions. The CVSS 4.0 vector indicates network attack vector, high attack complexity, no privileges or user interaction needed, and low impact on confidentiality, integrity, and availability. The vendor was notified but has not responded or issued a patch, and no official patch links are available. While no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of future attacks. ChurchCRM is a widely used open-source church management system, making this vulnerability relevant to many religious and community organizations globally.
Potential Impact
If exploited, this vulnerability could allow remote attackers to execute arbitrary code or manipulate the application’s behavior by exploiting unsafe deserialization. This could lead to unauthorized access to sensitive data such as member information, financial records, or internal communications managed by ChurchCRM. The integrity of the application and its data could be compromised, potentially disrupting church operations or community services. Although the CVSS score indicates medium severity, the real-world impact could be significant for organizations relying heavily on ChurchCRM for their daily operations. The lack of vendor response and patches increases the window of exposure. Given the attack complexity is high, widespread exploitation may be limited initially, but skilled attackers could leverage this vulnerability for targeted attacks. The vulnerability’s remote exploitability without authentication makes it a notable risk for exposed ChurchCRM installations.
Mitigation Recommendations
Organizations should immediately review their ChurchCRM deployments and restrict access to the setup routes, especially the setup.php file, via network controls such as firewalls or web application firewalls (WAFs). Implement input validation and sanitization on the affected parameters (DB_PASSWORD, ROOT_PATH, URL) to prevent malicious serialized data from being processed. If possible, disable or restrict deserialization routines in the application or apply custom patches to sanitize inputs before deserialization. Monitor network traffic and application logs for unusual requests targeting setup.php or attempts to manipulate these parameters. Consider isolating ChurchCRM instances in segmented network zones to limit exposure. Stay alert for official patches or updates from the vendor and apply them promptly once available. In the absence of vendor patches, consider engaging with the ChurchCRM community or security experts to develop interim fixes. Regularly back up ChurchCRM data to enable recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-18T12:54:26.566Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f4954ddd9718ca70979f34
Added to database: 10/19/2025, 7:37:49 AM
Last enriched: 2/24/2026, 9:34:10 PM
Last updated: 3/24/2026, 7:37:18 AM
Views: 241
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.