CVE-2025-62521: CWE-94: Improper Control of Generation of Code ('Code Injection') in ChurchCRM CRM
ChurchCRM is an open-source church management system. Prior to version 5.21.0, a pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise. The vulnerability exists in `setup/routes/setup.php` where user input from the setup form is directly concatenated into a PHP configuration template without any validation or sanitization. Any parameter in the setup form can be used to inject PHP code that gets written to `Include/Config.php`, which is then executed on every page load. This is more severe than typical authenticated RCE vulnerabilities because it requires no credentials and affects the installation process that administrators must complete. Version 5.21.0 patches the issue.
AI Analysis
Technical Summary
CVE-2025-62521 is a critical vulnerability affecting ChurchCRM, an open-source church management system, in versions prior to 5.21.0. The vulnerability arises from improper control of code generation (CWE-94) during the setup wizard process. Specifically, the setup/routes/setup.php script directly concatenates user-supplied input from the setup form into a PHP configuration template without any validation or sanitization. This allows an unauthenticated attacker to inject arbitrary PHP code into the Include/Config.php file. Since this configuration file is executed on every page load, the injected code results in remote code execution (RCE) with the privileges of the web server user. The attack vector requires no authentication or user interaction, making it exceptionally dangerous. The vulnerability affects the initial installation phase, a process that administrators must complete, thus increasing the risk of exploitation in fresh deployments or re-installations. The vulnerability has a CVSS v3.1 score of 10.0, reflecting its criticality with network attack vector, no required privileges, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and severity warrant immediate attention. The issue is resolved in ChurchCRM version 5.21.0, which implements proper input validation and sanitization to prevent code injection during setup.
Potential Impact
For European organizations using ChurchCRM, especially religious institutions and affiliated non-profits, this vulnerability poses a severe risk. Exploitation leads to full server compromise, allowing attackers to execute arbitrary code, steal sensitive data, manipulate records, or deploy further malware. Given the pre-authentication nature, attackers can compromise systems before administrators complete setup, potentially establishing persistent backdoors. This can disrupt organizational operations, damage reputation, and lead to data breaches involving personal and financial information of members. The impact extends to availability, as attackers could deface or disable the CRM system. Since ChurchCRM is open-source and likely deployed in small to medium-sized organizations with limited cybersecurity resources, the risk of exploitation may be higher. Additionally, the vulnerability could be leveraged as a foothold in broader supply chain or sector-specific attacks targeting faith-based organizations in Europe.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 5.21.0 or later to apply the official patch. Until upgrade, restrict access to the setup wizard by network segmentation or firewall rules, allowing only trusted administrators to reach the installation interface. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the setup form. Conduct installation in isolated, secure environments to prevent unauthorized access during setup. Monitor logs for unusual activity related to setup routes and configuration file modifications. Educate administrators to verify the integrity of Include/Config.php after installation and before going live. Consider deploying runtime application self-protection (RASP) solutions to detect and prevent code injection attempts. Finally, maintain regular backups of configuration and data to enable recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-62521: CWE-94: Improper Control of Generation of Code ('Code Injection') in ChurchCRM CRM
Description
ChurchCRM is an open-source church management system. Prior to version 5.21.0, a pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise. The vulnerability exists in `setup/routes/setup.php` where user input from the setup form is directly concatenated into a PHP configuration template without any validation or sanitization. Any parameter in the setup form can be used to inject PHP code that gets written to `Include/Config.php`, which is then executed on every page load. This is more severe than typical authenticated RCE vulnerabilities because it requires no credentials and affects the installation process that administrators must complete. Version 5.21.0 patches the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-62521 is a critical vulnerability affecting ChurchCRM, an open-source church management system, in versions prior to 5.21.0. The vulnerability arises from improper control of code generation (CWE-94) during the setup wizard process. Specifically, the setup/routes/setup.php script directly concatenates user-supplied input from the setup form into a PHP configuration template without any validation or sanitization. This allows an unauthenticated attacker to inject arbitrary PHP code into the Include/Config.php file. Since this configuration file is executed on every page load, the injected code results in remote code execution (RCE) with the privileges of the web server user. The attack vector requires no authentication or user interaction, making it exceptionally dangerous. The vulnerability affects the initial installation phase, a process that administrators must complete, thus increasing the risk of exploitation in fresh deployments or re-installations. The vulnerability has a CVSS v3.1 score of 10.0, reflecting its criticality with network attack vector, no required privileges, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and severity warrant immediate attention. The issue is resolved in ChurchCRM version 5.21.0, which implements proper input validation and sanitization to prevent code injection during setup.
Potential Impact
For European organizations using ChurchCRM, especially religious institutions and affiliated non-profits, this vulnerability poses a severe risk. Exploitation leads to full server compromise, allowing attackers to execute arbitrary code, steal sensitive data, manipulate records, or deploy further malware. Given the pre-authentication nature, attackers can compromise systems before administrators complete setup, potentially establishing persistent backdoors. This can disrupt organizational operations, damage reputation, and lead to data breaches involving personal and financial information of members. The impact extends to availability, as attackers could deface or disable the CRM system. Since ChurchCRM is open-source and likely deployed in small to medium-sized organizations with limited cybersecurity resources, the risk of exploitation may be higher. Additionally, the vulnerability could be leveraged as a foothold in broader supply chain or sector-specific attacks targeting faith-based organizations in Europe.
Mitigation Recommendations
European organizations should immediately upgrade ChurchCRM installations to version 5.21.0 or later to apply the official patch. Until upgrade, restrict access to the setup wizard by network segmentation or firewall rules, allowing only trusted administrators to reach the installation interface. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the setup form. Conduct installation in isolated, secure environments to prevent unauthorized access during setup. Monitor logs for unusual activity related to setup routes and configuration file modifications. Educate administrators to verify the integrity of Include/Config.php after installation and before going live. Consider deploying runtime application self-protection (RASP) solutions to detect and prevent code injection attempts. Finally, maintain regular backups of configuration and data to enable recovery in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-15T15:03:28.135Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694302860b6f32e62bed0ec0
Added to database: 12/17/2025, 7:20:38 PM
Last enriched: 12/17/2025, 7:35:50 PM
Last updated: 12/18/2025, 5:57:43 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-47387: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon
HighCVE-2025-47382: CWE-863: Incorrect Authorization in Qualcomm, Inc. Snapdragon
HighCVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
CriticalCVE-2025-47350: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon
HighCVE-2025-47325: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.