CVE-2025-11939: Path Traversal in ChurchCRM
A vulnerability was determined in ChurchCRM up to 5.18.0. This issue affects some unknown processing of the file src/ChurchCRM/Backup/RestoreJob.php of the component Backup Restore Handler. Executing manipulation of the argument restoreFile can lead to path traversal. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11939 is a path traversal vulnerability identified in ChurchCRM, an open-source church management software, affecting all versions up to 5.18.0. The vulnerability resides in the Backup Restore Handler component, specifically in the src/ChurchCRM/Backup/RestoreJob.php file. The issue arises from insufficient validation of the 'restoreFile' argument, which an attacker can manipulate to traverse directories and access files outside the intended backup restore scope. This flaw can be exploited remotely but requires the attacker to have high privileges on the system, such as authenticated administrative access, to invoke the vulnerable functionality. The vulnerability could allow unauthorized reading or modification of sensitive files, potentially leading to data leakage or corruption of backup data. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the moderate impact and the requirement for elevated privileges. The vendor was notified early but has not issued a patch or response, and no known exploits have been observed in the wild. This lack of remediation increases the risk for organizations relying on this software for critical data backup and restoration processes.
Potential Impact
For European organizations, especially those using ChurchCRM for managing church or community data, this vulnerability poses a risk of unauthorized access to sensitive backup files, potentially exposing personal data or internal records. The path traversal could lead to partial compromise of confidentiality by reading files outside the backup scope, integrity by modifying backup data, and availability if critical backup files are corrupted or deleted. Given the requirement for high privileges, the threat is more significant if internal accounts are compromised or if insider threats exist. The lack of vendor response and patch availability increases the risk exposure. Organizations that rely heavily on ChurchCRM for operational continuity may face disruptions or data breaches, impacting trust and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
European organizations should immediately audit and restrict access to ChurchCRM administrative interfaces to trusted personnel only, ensuring strong authentication and authorization controls are in place. Input validation should be enforced on the 'restoreFile' parameter to prevent directory traversal sequences (e.g., '..' or absolute paths). Network segmentation and firewall rules should limit remote access to backup restore functionalities. Monitoring and logging of backup restore operations should be enhanced to detect suspicious activities. Where possible, organizations should consider isolating the backup restore process in a sandboxed environment to limit potential damage. Until an official patch is released, organizations might explore applying custom patches or workarounds that sanitize input parameters. Regular backups should be maintained separately to ensure recovery in case of data corruption. Finally, organizations should engage with the ChurchCRM community or maintainers to advocate for a timely fix.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Austria
CVE-2025-11939: Path Traversal in ChurchCRM
Description
A vulnerability was determined in ChurchCRM up to 5.18.0. This issue affects some unknown processing of the file src/ChurchCRM/Backup/RestoreJob.php of the component Backup Restore Handler. Executing manipulation of the argument restoreFile can lead to path traversal. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11939 is a path traversal vulnerability identified in ChurchCRM, an open-source church management software, affecting all versions up to 5.18.0. The vulnerability resides in the Backup Restore Handler component, specifically in the src/ChurchCRM/Backup/RestoreJob.php file. The issue arises from insufficient validation of the 'restoreFile' argument, which an attacker can manipulate to traverse directories and access files outside the intended backup restore scope. This flaw can be exploited remotely but requires the attacker to have high privileges on the system, such as authenticated administrative access, to invoke the vulnerable functionality. The vulnerability could allow unauthorized reading or modification of sensitive files, potentially leading to data leakage or corruption of backup data. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the moderate impact and the requirement for elevated privileges. The vendor was notified early but has not issued a patch or response, and no known exploits have been observed in the wild. This lack of remediation increases the risk for organizations relying on this software for critical data backup and restoration processes.
Potential Impact
For European organizations, especially those using ChurchCRM for managing church or community data, this vulnerability poses a risk of unauthorized access to sensitive backup files, potentially exposing personal data or internal records. The path traversal could lead to partial compromise of confidentiality by reading files outside the backup scope, integrity by modifying backup data, and availability if critical backup files are corrupted or deleted. Given the requirement for high privileges, the threat is more significant if internal accounts are compromised or if insider threats exist. The lack of vendor response and patch availability increases the risk exposure. Organizations that rely heavily on ChurchCRM for operational continuity may face disruptions or data breaches, impacting trust and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
European organizations should immediately audit and restrict access to ChurchCRM administrative interfaces to trusted personnel only, ensuring strong authentication and authorization controls are in place. Input validation should be enforced on the 'restoreFile' parameter to prevent directory traversal sequences (e.g., '..' or absolute paths). Network segmentation and firewall rules should limit remote access to backup restore functionalities. Monitoring and logging of backup restore operations should be enhanced to detect suspicious activities. Where possible, organizations should consider isolating the backup restore process in a sandboxed environment to limit potential damage. Until an official patch is released, organizations might explore applying custom patches or workarounds that sanitize input parameters. Regular backups should be maintained separately to ensure recovery in case of data corruption. Finally, organizations should engage with the ChurchCRM community or maintainers to advocate for a timely fix.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-18T12:54:29.045Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f49c99a2d65d4c729ee8bd
Added to database: 10/19/2025, 8:08:57 AM
Last enriched: 10/19/2025, 8:10:42 AM
Last updated: 10/19/2025, 2:39:57 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11938: Deserialization in ChurchCRM
MediumAI Chat Data Is History's Most Thorough Record of Enterprise Secrets. Secure It Wisely
MediumAI Agent Security: Whose Responsibility Is It?
MediumMicrosoft Disrupts Ransomware Campaign Abusing Azure Certificates
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.