Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62521: CWE-94: Improper Control of Generation of Code ('Code Injection') in ChurchCRM CRM

0
Critical
VulnerabilityCVE-2025-62521cvecve-2025-62521cwe-94
Published: Wed Dec 17 2025 (12/17/2025, 19:03:20 UTC)
Source: CVE Database V5
Vendor/Project: ChurchCRM
Product: CRM

Description

ChurchCRM is an open-source church management system. Prior to version 5.21.0, a pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise. The vulnerability exists in `setup/routes/setup.php` where user input from the setup form is directly concatenated into a PHP configuration template without any validation or sanitization. Any parameter in the setup form can be used to inject PHP code that gets written to `Include/Config.php`, which is then executed on every page load. This is more severe than typical authenticated RCE vulnerabilities because it requires no credentials and affects the installation process that administrators must complete. Version 5.21.0 patches the issue.

AI-Powered Analysis

AILast updated: 12/17/2025, 19:35:50 UTC

Technical Analysis

CVE-2025-62521 is a critical vulnerability affecting ChurchCRM, an open-source church management system, in versions prior to 5.21.0. The vulnerability arises from improper control of code generation (CWE-94) during the setup wizard process. Specifically, the setup/routes/setup.php script directly concatenates user-supplied input from the setup form into a PHP configuration template without any validation or sanitization. This allows an unauthenticated attacker to inject arbitrary PHP code into the Include/Config.php file. Since this configuration file is executed on every page load, the injected code results in remote code execution (RCE) with the privileges of the web server user. The attack vector requires no authentication or user interaction, making it exceptionally dangerous. The vulnerability affects the initial installation phase, a process that administrators must complete, thus increasing the risk of exploitation in fresh deployments or re-installations. The vulnerability has a CVSS v3.1 score of 10.0, reflecting its criticality with network attack vector, no required privileges, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and severity warrant immediate attention. The issue is resolved in ChurchCRM version 5.21.0, which implements proper input validation and sanitization to prevent code injection during setup.

Potential Impact

For European organizations using ChurchCRM, especially religious institutions and affiliated non-profits, this vulnerability poses a severe risk. Exploitation leads to full server compromise, allowing attackers to execute arbitrary code, steal sensitive data, manipulate records, or deploy further malware. Given the pre-authentication nature, attackers can compromise systems before administrators complete setup, potentially establishing persistent backdoors. This can disrupt organizational operations, damage reputation, and lead to data breaches involving personal and financial information of members. The impact extends to availability, as attackers could deface or disable the CRM system. Since ChurchCRM is open-source and likely deployed in small to medium-sized organizations with limited cybersecurity resources, the risk of exploitation may be higher. Additionally, the vulnerability could be leveraged as a foothold in broader supply chain or sector-specific attacks targeting faith-based organizations in Europe.

Mitigation Recommendations

European organizations should immediately upgrade ChurchCRM installations to version 5.21.0 or later to apply the official patch. Until upgrade, restrict access to the setup wizard by network segmentation or firewall rules, allowing only trusted administrators to reach the installation interface. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the setup form. Conduct installation in isolated, secure environments to prevent unauthorized access during setup. Monitor logs for unusual activity related to setup routes and configuration file modifications. Educate administrators to verify the integrity of Include/Config.php after installation and before going live. Consider deploying runtime application self-protection (RASP) solutions to detect and prevent code injection attempts. Finally, maintain regular backups of configuration and data to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-15T15:03:28.135Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694302860b6f32e62bed0ec0

Added to database: 12/17/2025, 7:20:38 PM

Last enriched: 12/17/2025, 7:35:50 PM

Last updated: 12/18/2025, 5:57:43 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats